By timothy from Slashdot's keeps-on-giving department
Ars Technica reports on the continuing revelations about the same junkware that Lenovo has shipped on their computers, but which is known now to be present in at least 14 pieces of software
.The list of software known to use the same HTTPS-breaking technology recently found preinstalled on Lenovo laptops has risen dramatically with the discovery of at least 12 new titles, including one that's categorized as a malicious trojan by a major antivirus provider. ... What all these applications have in common is that they make people less secure through their use of an easily obtained root CA [certificate authority], they provide little information about the risks of the technology, and in some cases they are difficult to remove," Matt Richard, a threats researcher on the Facebook security team, wrote in Friday's post. "Furthermore, it is likely that these intercepting SSL proxies won't keep up with the HTTPS features in browsers (e.g., certificate pinning and forward secrecy), meaning they could potentially expose private data to network attackers. Some of these deficiencies can be detected by antivirus products as malware or adware, though from our research, detection successes are sporadic."Read Replies (0)
By timothy from Slashdot's thought-he-was-great-in-wargames-though department
writes In 'The Imitation Game': Can This Big Fat Cliche Win Best Picture?, reviewer Monica Guzman blasts the film for distorting history and missing the opportunity to inspire today's tech savvy, highly surveilled generation to follow in Turing's path: Instead of an inventor, it shows a stereotype. Instead of inspiring us to follow in the footsteps of a person who shaped technology, the film inspires us only to get out of the way of the next genius who can. The Imitation Game changed aspects of the real Alan Turing's personality to conform more closely to our idea of the solitary nerd. It falls in line with the tired idea that only outcasts could love computers...As for explaining the science behind Turing's code-breaking machine, the movie doesn't bother. if invention doesn't deserve top billing in this story, where the technology at its heart is not only historically significant but hugely resonant in our lives today, then I don't know where it would. The message of the movie is that the uncommon man can do amazing things, but the message we need is that the common man, woman, anybody can and should tinker with the technology that manages our whole world. Read Replies (0)
By timothy from Slashdot's have-cake-and-eat-it-too department
New submitter Patrick O'Neill
writes with this excerpt from The Daily Dot: Anti-censorship technology is de jure illegal in Iran, but many VPNs are sold openly, allowing Iranians to bounce around censorship and seemingly render it ineffective. Nearly 7 in 10 young Iranians are using VPNs, according to the country's government, and a Google search for "buy VPN" in Persian returns 2 million results. Iran's Cyber Police (FATA) have waged a high-volume open war against the VPNs, but it's still very easy to find, buy, and use the software. It's so easy, in fact, that you can use Iran's government-sanctioned payment gateways (Pardakht Net, Sharj Iran, Jahan Pay & Baz Pardakht) to buy the tools that'll beat the censors. To use these gateways, however, customers have to submit their Iranian bank account and identity, all but foregoing hopes of privacy or protection from authorities."Read Replies (0)
By timothy from Slashdot's worst-case-scenarios department
Reuters and other news outlets carry the news that the Minnesota's gigantic Mall of America
is under heightened security after a video threat posted online
by terrorist group <a>Al-Shabaab</a>. Also at CNN
and CBS News
. According to Reuters' version of the story: The U.S. homeland security chief said on Sunday he takes seriously a threat made by Somali-based Islamist militants against shopping malls, including the Mall of America in Minnesota, and urged people going there to be careful.
Homeland Security Secretary Jeh Johnson was reacting to a video released by al Shabaab appearing to call for attacks on Western shopping areas, specifically mentioning Mall of America, the West Edmonton Mall in Canada and London's Oxford Street. ... Mall officials issued a statement about the threat made by the group, saying they are monitoring events with the help of federal, state and local law enforcement agencies.
"Mall of America has implemented extra security precautions, some may be noticeable to guests, and others won’t be," the officials said.Read Replies (0)
By timothy from Slashdot's if-at-first-you-don't-succeed department
writes Rachel Nuwer writes in the NYT that Dr. Sameer Chaudhry's online dating persona was garnering no response from the women he reached out to so he synthesized 86 literature studies on the subject of online dating in the fields of psychology, sociology, and computer, behavioral, and neurocognitive sciences.in hopes of improving his odds. As it turns out, success begins with picking a user name. While men are drawn to names linked to physical traits (e.g., Cutie), the researchers found, women prefer ones that indicate intelligence (e.g., Cultured). Both sexes respond well to playful names (e.g. Fun2bwith) and shy away from ones with negative connotations (e.g., Bugg). User names that begin with letters from the first half of the alphabet do better than those from the latter half. "As human beings, we have a tendency to give things at the top of a pile more value," says Khan. As for your profile photo, pick a photo with a genuine smile, one that crinkles the eyes, and with a slight head tilt (it's linked to attractiveness). And if you're looking for a male partner, go for that photo of you in siren red—a color that enhances men's attraction to women. "For those attracted to browse into the profile, a description of personal traits increased likeability when it: showed who the dater was and what they were looking for in a 70:30 ratio; stayed close to reality; and employed simple language with humor added. Invitations were most successful in obtaining a response from the potential date when they: were short personalized messages addressing a trait in their profile; rhymed with their screen name or headline message; and extended genuine compliments." And finally, don't wait too long before arranging a face to face meeting.Read Replies (0)
By timothy from Slashdot's good-idea-or-not department
writes Children grow up, and inevitably they will start using internet and social networks, both for educational and recreational purposes. And it won't take long to them to learn to be autonomous, especially with all the smartphones and tablets around and your limited time. Unlike the years of my youth, when internet started to enter our lives gradually, now I'm afraid of the amount of inappropriate contents a child can be exposed to unprepared: porn, scammers, cyberbullies or worse, are just a click away.
For Windows many solutions claim to exist, usually in form of massive antivirus suites. What about GNU/Linux? Or Android? Several solutions rely on setting up a proxy with a whitelist of sites, or similar, but I'm afraid this approach can make internet unusable, or otherwise be easy to bypass. Have you any experiences or suggestions? Do you think software solutions are only a part of the solution, provided children can learn hacking tricks better than us, and if so, what other 'human' techniques are most effective?Read Replies (0)