By BeauHD from Slashdot's copy-and-paste department
Bethesda, the video game publisher behind Fallout and The Elder Scrolls, is suing Warner Bros. and Fallout Shelter co-developer Behavior Interactive over the recently released Westworld, alleging that the mobile game based on HBO's TV series is a "blatant rip-off" of Fallout Shelter. Polygon reports: In a suit filed in a Maryland U.S. District Court, Bethesda alleges that Westworld -- developed by Behaviour and released this week for Android and iOS -- "has the same or highly similar game design, art style, animations, features and other gameplay elements" as Fallout Shelter. Fallout Shelter was originally released in 2015 for mobile devices. The game was later ported to Nintendo Switch, PlayStation 4, Windows PC and Xbox One.
Bethesda said in its suit that Behaviour uses "the same copyrighted computer code created for Fallout Shelter in Westworld," alleging that a bug evident in an early version of Fallout Shelter (which was later fixed) also appears in Westworld. Bethesda alleges the companies "copied Fallout Shelter's features and then made cosmetic modifications for Westworld's 'western' theme."Read Replies (0)
By BeauHD from Slashdot's sorry-not-sorry department
An anonymous reader quotes a report from The Register: Legendary games company Atari has accused a Register reporter of making stuff up and acting unprofessionally following an interview earlier this year in San Francisco at the launch of its new games console, the Atari VCS. In that article, we were critical of the fact that the machine did not work, and that its chief operating officer Michael Arzt, whom we spoke to, appeared unable to answer even the most basic questions about the product. We were shown "engineering design models" that were said to be "real" yet turned out did not work, and pointed out as much.
In the article, we wrote: "What happens if we plug this into our laptop, we ask Mike. I don't know, he says. Will it work? I don't know. If we plug it into a different games machine, will it work? No. So it's custom hardware and software? I don't know about that." Presumably this is where Atari feels that the reporter "wrote what he wanted instead of what was discussed with him." Which makes this clip tough to explain -- and we'll give you a clue: your humble Reg hack is the one with the British accent... This is a clip of Atari having no idea about its own controller. The Register goes on to provide more examples of how Atari "is so full of crap..." The accusations started via the company's Facebook page, where a potential buyer of an Atari VCS posted a link to the Reg article and asked the company to explain it. The full interview between the journalist and Atari can be found here.Read Replies (0)
By msmash from Slashdot's a-notable-victory department
Exploit kits, once a preferred choice of attackers to invade a victim's browser and find way to their computer, are increasingly diminishing in their effectiveness. If you have an updated browser, chances are it packs adequate resources to fight such attacks. Catalin Cimpanu, writing for BleepingComputer: Exploit kits (EK) have been around on the criminal underground for more than a decade and were once pretty advanced, often being a place where researchers found zero-days on a regular basis. But as browsers got more secure in recent years, exploit kits started to die out in 2016-2017. Most operators were arrested, moved to other things, and nobody developed new exploits to add to the arsenal of EK left on the market, which slowly began falling behind when it came to their effectiveness to infect new victims. A Palo Alto Networks report published yesterday details statistics about the vulnerabilities used by current exploit kits in the first three months of the year (Q1 2018). According to the gathered data, researchers found 1,583 malicious URLs across 496 different domains, leading to landing pages (URLs) where an EK attempted to run exploits only for only a meager eight vulnerabilities. All eight were old and known bugs, with the newest dating back to 2016. Seven of the eight vulnerabilities targeted Internet Explorer, meaning that using a more modern browser like Chrome and Firefox is a simple, yet effective way of avoiding falling victim to exploit kits.Read Replies (0)
By BeauHD from Slashdot's moral-compass department
Mark Bergen reports via Bloomberg: Earlier this year, a group of influential software engineers in Google's cloud division surprised their superiors by refusing to work on a cutting-edge security feature. Known as "air gap," the technology would have helped Google win sensitive military contracts. The coders weren't persuaded their employer should be using its technological might to help the government wage war, according to four current and former employees. After hearing the engineers' objections, Urs Holzle, Google's top technical executive, said the air gap feature would be postponed, one of the people said. Another person familiar with the situation said the group was able to reduce the scope of the feature.
The act of rebellion ricocheted around the company, fueling a growing resistance among employees with a dim view of Google's yen for multi-million-dollar government contracts. The engineers became known as the "Group of Nine" and were lionized by like-minded staff. The current and former employees say the engineers' work boycott was a catalyst for larger protests that convulsed the company's Mountain View, California, campus and ultimately forced executives to let a lucrative Pentagon contract called Project Maven expire without renewal.Read Replies (0)
By BeauHD from Slashdot's baby-steps department
In an effort to promote tourism, the southern tropical Chinese island of Hainan will no longer censor its internet. "Visitors to select areas of Hainan will be able to access Facebook, Twitter, and YouTube, according to a new plan authorities have put together to turn the province into a free trade port by 2020," reports The Verge. "It's not clear if other banned platforms will be uncensored." From the report: The three-year action plan was published on Thursday, but removed from the local government website by Friday, as spotted by the South China Morning Post. For Hainan, China will lift part of its censorship system, or what's known as the Great Firewall, that blocks access to most foreign social media and news sites. Tourists will be able to enter designated zones in Hainan's two major cities to access Twitter, Facebook, and YouTube. Other banned foreign social media platforms, like Google, Instagram, or WhatsApp, haven't been mentioned.
Ironically, China appears to be censoring people's reactions to the news that some censorship is being lifted. One user on Weibo commented that people weren't allowed a chance to provide any feedback on the new tourism plan. "Thousands of comments have since been deleted. As if censoring people solved the problem."Read Replies (0)
By msmash from Slashdot's closer-look department
In data-hungry, tech-happy chain restaurants, customers are rating their servers using tabletop tablets, not realizing those ratings can put jobs at risk, an investigation by BuzzFeed News has found. From the report: When the Smokey Bones restaurant in Dayton, Ohio, where Nicole Bishop waits tables introduced Ziosk tabletop tablets, she wasn't too worried about them. Ziosks are designed to increase restaurant efficiency by allowing customers to order drinks, appetizers, and desserts, and pay their bill from the table without talking to a server. But, as Bishop soon discovered, they also prompt customers to take a satisfaction survey at the end of every meal, the results of which are turned into a score that's used to evaluate the server's performance. One day not long after the Ziosks appeared, Bishop found that her work schedules had been cut short in half, a change she estimated would cost her between $200 and $400 a week. The report documents stories of several other waiters, all of whom have been affected by the tablet. It adds: Ziosk tablets sit atop dining tables at more than 4,500 restaurants across the United States -- including most Chili's and Olive Gardens, and many TGI Friday's and Red Robins. Competitor E La Carte's PrestoPrime tablets are in more than 1,800 restaurants, including most Applebee's. Tens of thousands of servers are being evaluated based on a tech-driven, data-oriented customer feedback system many say is both inaccurate and unfair. And few of the customers holding the reins are even aware their responses have any impact on how much servers earn.Read Replies (0)
By msmash from Slashdot's catch-me-if-you-can department
An anonymous reader shares a report: Adobe, certainly aware of how complicit its software is in the creation of fake news images, is working on artificial intelligence that can spot the markers of phony photos. In other words, the maker of Photoshop is tapping into machine learning to find out if someone has Photoshopped an image. Using AI to find fake images is a way for Adobe to help "increase trust and authenticity in digital media," the company says. That brings it in line with the likes of Facebook and Google, which have stepped up their efforts to fight fake news. Whenever someone alters an image, unless they are pixel perfect in their work, they always leave behind indicators that the photo is modified. Metadata and watermarks can help determine a source image, and forensics can probe factors like lighting, noise distribution and edges on the pixel level to find inconsistencies. If a color is slightly off, for instance, forensic tools can flag it. But Adobe wagers that it could employ AI to find telltale signs of manipulation faster and more reliably.Read Replies (0)
By msmash from Slashdot's meanwhile-in-China department
Chinese raids of U.S. intellectual property have helped China build a solid high-tech economy. But the U.S. semiconductor industry is still far ahead -- and China is desperate to catch up. From a report: Semiconductor manufacturers are fighting to protect IP from the Chinese, fearing that, without coherent action from the Trump administration, Beijing could bulldoze their industries. Three weeks ago, Micron and South Korean chipmakers Samsung and SK Hynix all reported that the Chinese government had launched antitrust probes into their firms, and accused them of setting artificially high prices for memory chips. American companies and the U.S. government have long been suspicious about the link between China's anti-monopoly policies and its industrial goals. "They want access to the intellectual property. They need us to teach them how to do it. Once they have the industry, they want to push us out," an industry source familiar with China's investigation into Micron tells Axios. The price hikes, the source says, are largely due to a boom in demand for memory chips in everything from smartphones to autonomous vehicles. China's investigation is "a clear indication that they're not ready to make [semiconductors] work," says the source. The New York Times has a story which also details the lawsuit of how a Fujian govt-backed chipmaker allegedly stole secrets from Micron. Then Micron got sued for patent infringement in Fujian. Or as the Times reporter describes it, "This is how you lose a major tech company. First, a Beijing-backed buyout offer. Then friendly Chinese partnership proposals. Then the tech gets stolen. Then when you file a complaint in court, you get hit with investigations in China, your biggest market."Read Replies (0)
By msmash from Slashdot's closer-look department
As security webcams, security cameras, and pet and baby monitors become part of our lives, their underlying technology is increasingly receiving scrutiny from researchers. Many of these devices are woefully insecure, and an attacker could -- and in some cases, has -- take over these devices to perform internet scans, among other things. BleepingComputer's Catalin Cimpanu dives into the subject: In the last nine months, two security firms have published research on the matter. Both pieces of research detail how the camera vendor lets customers use a mobile app to control their device from remote locations and view its video stream. The mobile app requires the user to enter a device ID, and a password found on the device's box or the device itself. Under the hood, the mobile app connects to the vendor's backend cloud server, and this server establishes connections to each of the user's device in turn, based on the device ID and the last IP address the device has reported from.Read Replies (0)
By BeauHD from Slashdot's time-and-a-place department
Facial recognition technology is making its way into schools, raising privacy concerns among parents and officials. The New York Civil Liberties Union issued a report on the matter that focuses on one public school district in particular: Western New York's Lockport School District. "News reports indicate the district plans to have the invasive and error-prone technology installed by next school year," reports NYCLU. The Union sent a letter (PDF) to the New York State Education Department urging it to consider students' and teachers' privacy in reviewing the use of surveillance technology by school districts. They also "sent a freedom of information request to the district seeking details of how and where the technology will be used as well as who will have access to the sensitive data that gets collected." The report highlights some of the concerns/negatives of such a system. For starters, it costs millions of dollars (Lockport spent almost $4 million), which could be used for things like Wi-Fi, new computers, or 3D printers. It has the "potential to turn every step a student takes into evidence of a crime." The databases could include those used for immigration enforcement, making parents of immigrant students afraid to send their children to school for fear that they or their children could end up on ICE's radar. Last but not least, since facial recognition is notoriously inaccurate, "innocent students are likely to be misidentified and punished for things they didn't do."
Of course, it isn't all bad. Proponents of the system say it can be used to alert officials to whenever sex offenders, suspended students, fired employees, suspected gang members, or anyone else placed on a school's "blacklist" enters the premises. Do you think facial recognition cameras belong in schools?Read Replies (0)