By msmash from Slashdot's what's-happening department
Joseph Cox, reporting for DailyBeat: Uber's ride-sharing service has given birth to some of the most creative criminal scams to date, including using a GPS-spoofing app to rip off riders in Nigeria, and even ginning up fake drivers by using stolen identities. Add to those this nefariously genius operation: Cybercriminals, many working in Russia, have created their own illegitimate taxi services for other crooks by piggybacking off Uber's ride-sharing platform, sometimes working in collaboration with corrupt drivers. Based on several Russian-language posts across a number of criminal-world sites, this is how the scam works: The scammer needs an emulator, a piece of software which allows them to run a virtual Android phone on their laptop with the Uber app, as well as a virtual private network (VPN), which routes their computer's traffic through a server in the same city as the rider. The scammer acts, in essence, as a middleman between an Uber driver and the passenger -- ordering trips through the Uber app, but relaying messages outside of it. Typically, this fraudulent dispatcher uses the messaging app Telegram to chat with the passenger, who provides pickup and destination addresses. The scammer orders the trip, and then provides the car brand, driver name, and license plate details back to the passenger through Telegram.Read Replies (0)
By BeauHD from Slashdot's coming-soon department
An anonymous reader shares a report from BleepingComputer: The Russian government plans to build its own "independent internet infrastructure" that will be used by BRICS member states -- Brazil, Russia, India, China, and South Africa. The plan was part of the topic list at the October meeting of the Russian Security Council, and President Vladimir Putin approved the initiative with a completion deadline of August 1, 2018, according to Russian news agency RT. The Russian Security Council has today formally asked the country's government to start the building of a backup global DNS system that Russia and fellow BRICS member states could use. The Russian Security Council cited the "increased capabilities of western nations to conduct offensive operations in the informational space." Russia, China, and many other countries have criticized the U.S. for hoarding control over the domain naming system (DNS), a position they claim has allowed the U.S. to intercept and tap global internet traffic. The U.S. has relinquished control over the DNS system last year.Read Replies (0)
By BeauHD from Slashdot's short-lived department
Last year, the six-second video social media app called Vine was shut down by Twitter. The Verge reports that Vine's co-founder, Dom Hofmann, says he's working on "a follow-up to Vine," where he will be funding the project himself outside of his current company, Interspace. "I'm going to work on a follow-up to vine. i've been feeling it myself for some time and have seen a lot of tweets, dms, etc.," Hofmann tweeted.
Unfortunately, he didn't elaborate on his plans. It's possible the follow-up site could be another short-term video app similar to the original Vine, or some other project that will look to build on the foundation Vine started. Would you be interested in a new Vine-like social media app, or did Vine never really appeal to you to begin with?Read Replies (0)
By BeauHD from Slashdot's Newton's-third-law department
New submitter unarmed8 shares a report from CyberScoop: Three Democratic senators introduced legislation on Thursday requiring companies to notify customers of data breaches within thirty days of their discovery and imposing a five year prison sentence on organizations caught concealing data breaches. The new bill, called the Data Security and Breach Notification Act, was introduced in the wake of reports that Uber paid $100,000 to cover up a 2016 data breach that affected 57 million users. The scope of what kind of data breach falls under this is limited. For instance, if only a last name, address or phone number is breached, the law would not apply. If an organization "reasonably concludes that there is no reasonable risk of identity theft, fraud, or other unlawful conduct," the incident is considered exempt from the legislation.
"We need a strong federal law in place to hold companies truly accountable for failing to safeguard data or inform consumers when that information has been stolen by hackers," Sen. Bill Nelson, D-Fla., said in a statement. "Congress can either take action now to pass this long overdue bill or continue to kowtow to special interests who stand in the way of this commonsense proposal. When it comes to doing what's best for consumers, the choice is clear."Read Replies (0)
By BeauHD from Slashdot's point-A-to-point-B department
An anonymous reader quotes a report from Ars Technica: On Wednesday, the city of Chicago opened a Request for Qualifications (RFQ) for an express train that would take passengers from the city's O'Hare airport to downtown. The system would have to be completely privately funded -- Chicago says no taxpayer money would be used for it. Elon Musk's Boring Company -- a tunneling company that the SpaceX and Tesla CEO started last year -- will respond to the request. Musk hopes to get to the second round when bidding will take place. On Wednesday evening, he tweeted that his company "will compete to fund, build & operate a high-speed Loop connecting Chicago O'Hare Airport to downtown."
Musk's reference to a "Loop" is explained more clearly on The Boring Company's FAQ page: "Loop is a high-speed underground public transportation system in which passengers are transported on autonomous electric skates traveling at 125-150 miles per hour. Electric skates will carry between 8 and 16 passengers (mass transit), or a single passenger vehicle." Unlike Musk's idea for a Hyperloop, a Loop won't draw a vacuum. "For shorter routes, there is no technical need to eliminate air friction," The Boring Company states. The company also clarifies the concept of an "electric skate:" that is "a platform on wheels propelled by multiple electric motors." The platform would operate autonomously without a rail or rails to which the skate would connect. The skate would operate in the tunnel's main artery, and it would enter and exit from side tunnels. With this system, The Boring Company says, the skate's average speed would theoretically be able to operate close to maximum speed.Read Replies (0)
By msmash from Slashdot's what's-in-a-name department
Lorenzo Franceschi-Bicchierai, writing for the Motherboard: Lately on the internet, people in the world of Bitcoin and other digital currencies are starting to use the word "crypto" as a catch-all term for the lightly regulated and burgeoning world of digital currencies in general, or for the word "cryptocurrency" -- which probably shouldn't even be called "currency," by the way. For example, in response to the recent rise of Bitcoin's price, the CEO of Shapeshift recently tweeted: "don't go into debt to buy crypto at these prices." "Crypto Stocks Rise," read a headline on Tuesday from the trade publication Investor Business Daily. But the financial blog Seeking Alpha outdid them all by publishing a post titled "Tales From The Crypto." Excuse me, "the crypto" what? As someone who has read and written about cryptography for a few years now, and who is a big fan of Crypto, the 2001 book by Steven Levy, this is a problem. "Crypto" does not mean cryptocurrency. The above are just three examples picked at random, but if you don't believe me, just search "crypto" on Google News or Twitter. On the internet, "crypto" has always been used to refer to cryptography. Think, for example, the term "Crypto Wars," which refer to government (originally the US government) efforts to undermine and slow down the adoption of unbreakable communications systems. By the way, the book Crypto isn't about Bitcoin. It's about cryptography, and more in particular, about the cryptographers who fought the government in the so-called Crypto Wars.Read Replies (0)
By msmash from Slashdot's shape-of-things-to-come department
Alexis C. Madrigal, writing for The Atlantic: If the recent numbers are any indication, there is a bloodbath in digital media this year. Publishers big and small are coming up short on advertising revenue, even if they are long on traffic. [...] In a print newspaper or a broadcast television station, the content and the distribution of that content are integrated. The big tech platforms split this marriage, doing the distribution for most digital content through Google searches and the Facebook News Feed. And they've taken most of the money: They've "captured the value" of the content at the distribution level. Media companies have no real alternative, nor do they have competitive advertising products to the targeting and scale that Facebook and Google can offer. Facebook and Google need content, but it's all fungible. The recap of a huge investigative blockbuster is just as valuable to Google News as an investigative blockbuster itself. The former might have taken months and costs tens of thousands of dollars, the latter a few hours and the cost of a young journalist's time. That's led many people to the conclusion that supporting rigorous journalism requires some sort of direct financial relationship between publications and readers. Right now, the preferred method is the paywall. The New York Times has one. The Washington Post has one. The Financial Times has one. The Wall Street Journal has one. The New Yorker has one. Wired just announced they'd be building one. (Editor's note: CNN is building a paywall, too.) Many of these efforts have been successful. Publications have figured out how to create the right kinds of porosity for their sites, allowing enough people in to drive scale, but extracting more revenue per reader than advertising could provide.Read Replies (0)
By msmash from Slashdot's dnr department
A real-life case study, published on New England Journal of Medicine, documents the ethical dilemma that a Florida hospital faced after a 70-year-old unresponsive patient arrived at the hospital. The medical staff, the journal notes, was taken aback when it discovered the words "DO NOT RESUSCITATE" tattooed onto the man's chest. Furthermore, the word "NOT" was underlined with his signature beneath it. The patient had a history of chronic obstructive pulmonary disease, diabetes mellitus, and atrial fibrillation. Confused and alarmed, the medical staff chose to ignore the apparent DNR request -- but not without alerting the hospital's ethics team, which had a different take on the matter. From the report: We initially decided not to honor the tattoo, invoking the principle of not choosing an irreversible path when faced with uncertainty. This decision left us conflicted owing to the patient's extraordinary effort to make his presumed advance directive known; therefore, an ethics consultation was requested. He was placed on empirical antibiotics, received intravenous fluid resuscitation and vasopressors, and was treated with bilevel positive airway pressure. After reviewing the patient's case, the ethics consultants advised us to honor the patient's do not resuscitate (DNR) tattoo. They suggested that it was most reasonable to infer that the tattoo expressed an authentic preference, that what might be seen as caution could also be seen as standing on ceremony, and that the law is sometimes not nimble enough to support patient-centered care and respect for patients' best interests. A DNR order was written. Subsequently, the social work department obtained a copy of his Florida Department of Health "out-of-hospital" DNR order, which was consistent with the tattoo. The patient's clinical status deteriorated throughout the night, and he died without undergoing cardiopulmonary respiration or advanced airway management.Read Replies (0)