By manishs from Slashdot's security-breach department
Joseph Cox, reporting for Motherboard: Tens of thousands of subscriber accounts for media company Infowars are being traded in the digital underground. Infowars, created by famed radio host and conspiracy theorist Alex Jones, produces radio, documentaries and written pieces. The dumped data relates to Prison Planet TV, which gives paying subscribers access to a variety of Infowars content. The data includes email addresses, usernames, and poorly hashed passwords. The administrator of breach notification site Databases. Land provided a copy of 100,223 records to Motherboard for verification purposes. Vigilante.PW, another breach notification service, also has the Infowars dump listed on its site, and says the data comes from 2014. However, every record appears to have been included twice in the data, making the actual number of user accounts closer to 50,000.Motherboard adds that it tested a few of the login credentials and that they worked.Read Replies (0)
By manishs from Slashdot's better-measures department
An anonymous reader shares a BGR report: Cyber threats today are no longer restricted to a company's communications and IT domains, calling for more than just technical controls to avert attacks and protect the business from future risks and breaches, a new report said. According to the joint report of the Confederation of Indian Industry (CII) and KPMG, cyber security today embraces multiple units of an organization like human resource, supply chain, administration and infrastructure. It, therefore, requires governance at the highest levels. "It is vital to keep pace with the changing regulatory and technology landscape to safeguard and advance business objectives. Working backwards by identifying and understanding future risks, predicting risks and acting ahead of competition, can make a company more robust," said Richard Rekhy, Chief Executive Officer, KPMG, India.Read Replies (0)
By EditorDavid from Slashdot's blue-planet department
An anonymous Slashdot reader quotes the BBC:
A team of six people have completed a Mars simulation in Hawaii, where they lived in near isolation for a year. Since August 29th, 2015, the group lived in close quarters in a dome, without fresh air, fresh food or privacy... Having survived their year in isolation, the crew members said they were confident a mission to Mars could succeed. "I can give you my personal impression which is that a mission to Mars in the close future is realistic," Cyprien Verseux, a crew member from France, told journalists. "I think the technological and psychological obstacles can be overcome."
The team consisted of a French astro-biologist, a German physicist and four Americans -- a pilot, an architect, a journalist and a soil scientist... the six had to live with limited resources, wear a space-suit when outside the dome, and work to avoid personal conflicts. They each had a small sleeping cot and a desk inside their rooms. Provisions included powdered cheese and canned tuna.Read Replies (0)
By EditorDavid from Slashdot's Code-Monkey-like-Fritos department
In a new article on GeekWire, Jonathan Coulton explains why he left a comfortable software development job in 2005 to launch a career as an online singer-songwriter. But he also describes the things he learned from the tech industry.
"These guys were doing this thing they wanted to do, this thing they felt competent doing. They didn't chase after things, and they worked hard, but it was a business they created because they enjoyed it. They tried to minimize the things they didn't want to do. It wasn't about getting rich; it was about getting satisfied...
"I wanted to a set a good example to my children. I wanted to be the person I wanted to be, someone willing to take chances -- a person who didn't live with enormous regrets..." Within the first year, he had not replaced his software salary, but had enough success to cover his babysitter and to keep food on the table.
When he was younger -- in the pre-internet days -- "It was very unclear how to become a musician," Coulton explains. But somehow rolling his own career path eventually led to a life which includes everything from guest appearances on radio shows to an annual cruise with his fans (this year featuring Aimee Mann, Wil Wheaton, and Redshirts author John Scalzi).Read Replies (0)
By EditorDavid from Slashdot's do-as-I-say department
Today the San Jose Mercury News asked several prominent security experts which security products they were actually using for their own data. An anonymous Slashdot reader writes:
The EFF's chief technologist revealed that he doesn't run an anti-virus program, partly because he's using Linux, and partly because he feels anti-virus software creates a false sense of security. ("I don't like to get complacent and rely on it in any way...") He does regularly encrypt his e-mail, "but he doesn't recommend that average users scramble their email, because he thinks the encryption software is just too difficult to use."
The newspaper also interviewed security expert Eugene Spafford, who rarely updates the operating system on one of his computers -- because it's not connected to the internet -- and sometimes even accesses his files with a virtual machine, which he then deletes when he's done. His home router is equipped with a firewall device, and "he's developed some tools in his research center that he uses to try to detect security problems," according to the article. "There are some additional things I do," Spafford added, telling the reporter that "I'm not going to give details of all of them, because that doesn't help me."
Bruce Schneier had a similar answer. When the reporter asked how he protected his data, Schneier wouldn't tell them, adding "I'm kind of a target..."Read Replies (0)
By EditorDavid from Slashdot's bringing-more-things-to-life department
Slashdot reader mspohr shares an article about "General Electric 're-inventing' itself as a software start-up." Jeffrey R. Immelt, the CEO of America's largest manufacturer, describes how he realized that data collected from their machines -- like turbines, engines, and medical-imaging equipment -- could be as valuable as the machines themselves. Now G.E. is hiring software engineers and data scientists from Amazon, Apple, Facebook and Google to try to transform the company into a "124-year-old startup" to take advantage of the Internet of Things and offer futuristic new services like predictive maintenance.
The Times calls it "the next battlefield as companies fight to develop the dominant software layer that connects the machines," adding that by 2020 there will be 100 times as much data flowing from G.E.'s machines. Now G.E. Digital is using the open source PaaS, Cloud Foundry, to develop Predix, a cloud-based operating system for industrial applications like monitoring and adjusting equipment in the field, whether it's an oil-field rig or a wind-farm turbine. To help transform the company into a digital powerhouse, they're building a 1,400-employee complex in San Ramon, California "designed to suit the free-range working ways of software developers: open-plan floors, bench seating, whiteboards, couches for impromptu meetings, balconies overlooking the grounds and kitchen areas with snacks." And they've also launched the Industrial Dojo program "to accelerate the ability for developers to contribute code that enables the Industrial Internet".Read Replies (0)
By EditorDavid from Slashdot's inspired-in-India department
Sunday the Indian Space Research Organization successfully test-launched a scramjet rocket, propelled by "an air-breathing propulsion system which uses hydrogen as fuel and oxygen from the atmosphere air as the oxidizer" rather than carrying a tank of liquid oxygen. "if the need for liquid oxygen is taken away, the space craft can be much lighter, hence cheaper to launch," notes one newspaper, adding that India is only the fourth country to flight-test a scramjet engine after the U.S., Russia and the European Space Agency.
But in addition, 15 former ISRO scientists are now helping Team Indus, one of the 16 teams remaining in Google's $30 million Lunar XPRIZE competition, who will use ISRO's polar satellite launch vehicle to send their spacecraft to the moon.
An official designated as "Skywalker", said that such space missions used to be limited to extremely elite people and PhDs in the past. That stereotype is now breaking. "I was just a college student a couple of years ago and now I am working on an actual space mission, how cool is that," said Karan Vaish, 23, who is helping the team to design the lunar rover. Eighty per cent of the team is reported to be less than five years out of college.Read Replies (0)
By EditorDavid from Slashdot's It's-a-RAID department
An anonymous Slashdot reader has "approximately two terabytes of photos, currently sitting on two 4-terabyte 'Intel Rapid Storage' RAID 1 disks." But now they're considering three alternatives after moving to a new PC:
a) Keep these exactly as they are... The current configuration is OK, but it's a pain if a RAID re-sync is needed as it takes a long time to check four terabytes.
b) Move to "Storage Spaces". I've not used Storage Spaces before, but reports seem to show it's good... It's a Good Thing that the disks are 100% identical and removable and readable separately. Downside? Unknown territory.
c) Break the RAID, and set up the second disk as a file-copied backup... [This] would lose a (small) amount of resilience, but wouldn't suffer from the RAID-sync issues, ideally a Mac-like "TimeMachine" backup would handle file histories.
This is also a good time to share your experiences with Storage Spaces, so leave your answers in the comments. What's the best way to backup large amounts of personal data?Read Replies (0)
By EditorDavid from Slashdot's looking-guilty department
New York doubled the number of "measurement points" used by their facial recognitation technology this year, leading to 100 arrests for fraud and identity theft, plus another 900 open cases. An anonymous reader quotes a report from Ars Technica:
In all, since New York implemented facial recognition technology in 2010, more than 14,000 people have been hampered trying to get multiple licenses. The newly upgraded system increases the measurement points of a driver's license picture from 64 to 128.
The DMV said this vastly improves its chances of matching new photographs with one already in a database of 16 million photos... "Facial recognition plays a critical role in keeping our communities safer by cracking down on individuals who break the law," Gov. Andrew M. Cuomo said in a statement. "New York is leading the nation with this technology, and the results from our use of this enhanced technology are proof positive that its use is vital in making our roads safer and holding fraudsters accountable."
At least 39 US states use some form of facial recognition software, and New York says their new system also "removes high-risk drivers from the road," stressing that new licenses will no longer be issued until a photo clears their database.Read Replies (0)
By EditorDavid from Slashdot's No-Man's-Refund department
thegarbz writes: As was covered previously on Slashdot the very hyped up game No Man's Sky was released to a lot of negative reviews about game-crashing bugs and poor interface choices. Now that players have had more time to play the game it has become clear that many of the features hyped by developers are not present in the game, and users quickly started describing the game as "boring".
Now, likely due to misleading advertising, Steam has begun allowing refunds for No Man's Sky regardless of playtime, and there are reports of players getting refunds on the Play Station Network as well despite Sony's strict no refund policy.
Besides Sony, Amazon is also issuing refunds, according to game sites. In response, Sony's former Strategic Content Director, Shahid Kamal Ahmad, wrote on Twitter, "If you're getting a refund after playing a game for 50 hours you're a thief." He later added "Here's the good news: Most players are not thieves. Most players are decent, honest people without whose support there could be no industry." In a follow-up he acknowledged it was fair to consider a few hours lost to game-breaking crashes, adding "Each case should be considered on its own merits and perhaps I shouldn't be so unequivocal."Read Replies (0)
By EditorDavid from Slashdot's portable-pioneers department
John Ellenby managed the development of the Alto II before starting the company that built the world's first successful "clamshell" laptop. Slashdot reader fragMasterFlash quotes the New York Times: Ellenby, a British-born computer engineer who played a critical role in paving the way for the laptop computer, died on August 17 in San Francisco. He was 75... Mr. Ellenby's pioneering work came to fruition in the early 1980s, after he founded Grid Systems, a company in Mountain View, California. As chief executive, he assembled an engineering and design team that included the noted British-born industrial designer William Moggridge. The team produced a clamshell computer with an orange electroluminescent flat-panel display that was introduced as the Compass. It went to market in 1982. The Compass is now widely acknowledged to have been far ahead of its time.
Back in the 1980s, NASA used them as backup navigational devices on the space shuttle -- one was recovered from the wreckage of the Space Shuttle Challenger -- and John Poindexter, America's national security advisor during the Reagan administration, described them as "built like an armored tank". Data storage cost $8,150 -- equivalent to $20,325 today.Read Replies (0)
By EditorDavid from Slashdot's megauploads,-micropayments department
Long-time Slashdot reader SonicSpike quotes an article from Fortune: The controversial entrepreneur Kim Dotcom said last month that he was preparing to relaunch Megaupload, the file-sharing site that U.S. and New Zealand authorities dramatically shut down in 2012, with bitcoins being involved in some way... This system will be called Bitcache, and Dotcom claimed its launch would send the bitcoin price soaring way above its current $575 value. The launch of Megaupload 2.0 will take place on January 20, 2017, he said, urging people to "buy bitcoin while cheap, like right now, trust me..." Crucially, Dotcom said the Bitcache system would overcome bitcoin's scaling problems. "It eliminates all blockchain limitations," he claimed.
Every file transfer taking place over Megaupload "will be linked to a tiny Bitcoin micro transaction," Dotcom posted on Twitter. His extradition trial begins Monday, and he's asking the court to allow live-streaming of the trial "because of global interest in my case." Meanwhile, the FBI apparently let the registration lapse on the Megaupload domain, which they seized in 2012, and Ars Technica reports that the site is now full of porn ads.Read Replies (0)
By EditorDavid from Slashdot's infecting-an-iPhone department
Trailrunner7 quotes a report from On The Wire: Apple has patched three critical vulnerabilities in iOS that were identified when an attacker targeted a human rights activist in the UAE with an exploit chain that used the bugs to attempt to remotely jailbreak and infect his iPhone. The vulnerabilities include two kernel flaws and one in WebKit and Apple released iOS 9.3.5 to fix them. The attack that set off the investigation into the vulnerabilities targeted Ahmed Mansoor, an activist living in the UAE. Earlier this month, he received a text message that included a link to what was supposedly new information on human rights abuses. Suspicious, Manor forwarded the link to researchers at the University of Toronto's Citizen Lab, who recognized what they were looking at. "On August 10 and 11, 2016, Mansoor received SMS text messages on his iPhone promising ;new secrets' about detainees tortured in UAE jails if he clicked on an included link. Instead of clicking, Mansoor sent the messages to Citizen Lab researchers. We recognized the links as belonging to an exploit infrastructure connected to NSO Group, an Israel-based 'cyber war' company that sells Pegasus, a government-exclusive "lawful intercept" spyware product," Citizen Lab said in a new report on the attack and iOS flaws.Read Replies (0)