By timothy from Slashdot's worst-case-scenarios department
Reuters and other news outlets carry the news that the Minnesota's gigantic Mall of America
is under heightened security after a video threat posted online
by terrorist group <a>Al-Shabaab</a>. Also at CNN
and CBS News
. According to Reuters' version of the story: The U.S. homeland security chief said on Sunday he takes seriously a threat made by Somali-based Islamist militants against shopping malls, including the Mall of America in Minnesota, and urged people going there to be careful.
Homeland Security Secretary Jeh Johnson was reacting to a video released by al Shabaab appearing to call for attacks on Western shopping areas, specifically mentioning Mall of America, the West Edmonton Mall in Canada and London's Oxford Street. ... Mall officials issued a statement about the threat made by the group, saying they are monitoring events with the help of federal, state and local law enforcement agencies.
"Mall of America has implemented extra security precautions, some may be noticeable to guests, and others won’t be," the officials said.Read Replies (0)
By timothy from Slashdot's if-at-first-you-don't-succeed department
writes Rachel Nuwer writes in the NYT that Dr. Sameer Chaudhry's online dating persona was garnering no response from the women he reached out to so he synthesized 86 literature studies on the subject of online dating in the fields of psychology, sociology, and computer, behavioral, and neurocognitive sciences.in hopes of improving his odds. As it turns out, success begins with picking a user name. While men are drawn to names linked to physical traits (e.g., Cutie), the researchers found, women prefer ones that indicate intelligence (e.g., Cultured). Both sexes respond well to playful names (e.g. Fun2bwith) and shy away from ones with negative connotations (e.g., Bugg). User names that begin with letters from the first half of the alphabet do better than those from the latter half. "As human beings, we have a tendency to give things at the top of a pile more value," says Khan. As for your profile photo, pick a photo with a genuine smile, one that crinkles the eyes, and with a slight head tilt (it's linked to attractiveness). And if you're looking for a male partner, go for that photo of you in siren red—a color that enhances men's attraction to women. "For those attracted to browse into the profile, a description of personal traits increased likeability when it: showed who the dater was and what they were looking for in a 70:30 ratio; stayed close to reality; and employed simple language with humor added. Invitations were most successful in obtaining a response from the potential date when they: were short personalized messages addressing a trait in their profile; rhymed with their screen name or headline message; and extended genuine compliments." And finally, don't wait too long before arranging a face to face meeting.Read Replies (0)
By timothy from Slashdot's good-idea-or-not department
writes Children grow up, and inevitably they will start using internet and social networks, both for educational and recreational purposes. And it won't take long to them to learn to be autonomous, especially with all the smartphones and tablets around and your limited time. Unlike the years of my youth, when internet started to enter our lives gradually, now I'm afraid of the amount of inappropriate contents a child can be exposed to unprepared: porn, scammers, cyberbullies or worse, are just a click away.
For Windows many solutions claim to exist, usually in form of massive antivirus suites. What about GNU/Linux? Or Android? Several solutions rely on setting up a proxy with a whitelist of sites, or similar, but I'm afraid this approach can make internet unusable, or otherwise be easy to bypass. Have you any experiences or suggestions? Do you think software solutions are only a part of the solution, provided children can learn hacking tricks better than us, and if so, what other 'human' techniques are most effective?Read Replies (0)
By timothy from Slashdot's cybernetic-eyeballs-are-people-too department
writes The record amount of security challenges in 2014 undermined the confidence many had in high quality of open source software. Jim Zemlin, executive director of the Linux Foundation, addressed the issue head-on during last week's Linux Collaboration Summit. Zemlin quoted the oft-repeated Linus' law, which states that given enough eyes, all bugs are shallow. "In these cases the eyeballs weren't really looking", Zemlin said. "Modern software security is hard because modern software is very complex," he continued. Such complexity requires dedicated engineers, and thus the solution is to fund projects that need help. To date, the foundation's Core Infrastructure Initiative has helped out the NTP, OpenSSL and GnuPG projects, with more likely to come. The second key initiative is the Core Infrastructure Census, which aims to find the next Heartbleed before it occurs. The census is looking to find underfunded projects and those that may not have enough eyeballs looking at the code today."Read Replies (0)