Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

  • Gigabit Cellular Networks Could Happen, With 24GHz Spectrum

    An anonymous reader writes A Notice of Inquiry was issued by the Federal Communications Commission (FCC) on Friday that focuses research on higher frequencies for sending gigabit streams of mobile data. The inquiry specifically states that its purpose is to determine "what frequency bands above 24 GHz would be most suitable for mobile services, and to begin developing a record on mobile service rules and a licensing framework for mobile services in those bands". Cellular networks currently use frequencies between 600 MHz to 3 GHz with the most desirable frequencies under 1 GHz being owned by AT&T and Verizon Wireless. The FCC feels, however, that new technology indicates the potential for utilizing higher frequency ranges not necessarily as a replacement but as the implementation necessary to finally usher in 5G wireless technology. The FCC anticipates the advent of 5G commercial offerings within six years.

    49 comments | yesterday

  • Snapchat Will Introduce Ads, Attempt To Keep Them Other Than Creepy

    As reported by VentureBeat, dissapearing-message service Snapchat is introducing ads. Considering how most people feel about ads, they're trying to ease them in gently: "Ads can be ignored: Users will not be required to watch them. If you do view an ad, or if you ignore it for 24 hours, it will disappear just like Stories do." Hard to say how much it will mollify the service's users, but the company says "We won’t put advertisements in your personal communication – things like Snaps or Chats. That would be totally rude. We want to see if we can deliver an experience that’s fun and informative, the way ads used to be, before they got creepy and targeted."

    119 comments | 2 days ago

  • Facebook 'Safety Check' Lets Friends Know You're OK After a Major Disaster

    rtoz (2530056) writes Facebook has launched a new Tool called "Safety Check." The Facebook Safety Check tool will notify your friends so that they know you're OK after a major disaster. In times of disaster or crisis, people turn to Facebook to check on loved ones and get updates. "During a major disaster, Safety Check will help you: Let friends and family know you're safe; Check on others in the affected area; Mark your friends as safe ... When the tool is activated after a natural disaster and if you're in the affected area, you'll receive a Facebook notification asking if you're safe. [Facebook] will determine your location by looking at the city you have listed in your profile, your last location if you've opted in to the Nearby Friends product, and the city where you are using the internet. ... If you're safe, you can select "I'm Safe" and a notification and News Feed story will be generated with your update. Your friends can also mark you as safe." More creepy, or more reassuring?

    126 comments | 2 days ago

  • FBI Director Continues His Campaign Against Encryption

    apexcp writes Following the announcements that Apple and Google would make full disk encryption the default option on their smartphones, FBI director James Comey has made encryption a key issue of his tenure. His blitz continues today with a speech that says encryption will hurt public safety.

    280 comments | 3 days ago

  • Millions of Voiceprints Quietly Being Harvested

    An anonymous reader sends this excerpt from The Guardian: Businesses and governments around the world increasingly are turning to voice biometrics, or voiceprints, to pay pensions, collect taxes, track criminals and replace passwords. "We sometimes call it the invisible biometric," said Mike Goldgof, an executive at Madrid-based AGNITiO, one of about 10 leading companies in the field. Those companies have helped enter more than 65M voiceprints into corporate and government databases, according to Associated Press interviews with dozens of industry representatives and records requests in the United States, Europe and elsewhere. ... The single largest implementation identified by the AP is in Turkey, where the mobile phone company Turkcell has taken the voice biometric data of some 10 million customers using technology provided by market leader Nuance Communications Inc. But government agencies are catching up.

    86 comments | 5 days ago

  • Google Finds Vulnerability In SSL 3.0 Web Encryption

    AlbanX sends word that security researchers from Google have published details on a vulnerability in SSL 3.0 that can allow an attacker to calculate the plaintext of encrypted communications. Google's Bodo Moller writes, SSL 3.0 is nearly 15 years old, but support for it remains widespread. Most importantly, nearly all browsers support it and, in order to work around bugs in HTTPS servers, browsers will retry failed connections with older protocol versions, including SSL 3.0. Because a network attacker can cause connection failures, they can trigger the use of SSL 3.0 and then exploit this issue. Disabling SSL 3.0 support, or CBC-mode ciphers with SSL 3.0, is sufficient to mitigate this issue, but presents significant compatibility problems, even today. Therefore our recommended response (PDF) is to support TLS_FALLBACK_SCSV. This is a mechanism that solves the problems caused by retrying failed connections and thus prevents attackers from inducing browsers to use SSL 3.0. It also prevents downgrades from TLS 1.2 to 1.1 or 1.0 and so may help prevent future attacks.

    68 comments | 5 days ago

  • ISPs Violating Net Neutrality To Block Encryption

    Dupple writes One of the most frequent refrains from the big broadband players and their friends who are fighting against net neutrality rules is that there's no evidence that ISPs have been abusing a lack of net neutrality rules in the past, so why would they start now? That does ignore multiple instances of violations in the past, but in combing through the comments submitted to the FCC concerning net neutrality, we came across one very interesting one that actually makes some rather stunning revelations about the ways in which ISPs are currently violating net neutrality/open internet principles in a way designed to block encryption and thus make everyone a lot less secure.

    149 comments | about a week ago

  • How English Beat German As the Language of Science

    HughPickens.com writes German was the dominant scientific language in 1900. Today if a scientist is going to coin a new term, it's most likely in English. And if they are going to publish a new discovery, it is most definitely in English. Look no further than the Nobel Prize awarded for physiology and medicine to Norwegian couple May-Britt and Edvard Moser. Their research was written and published in English. How did English come to dominate German in the realm of science? BBC reports that the major shock to the system was World War One, which had two major impacts. According to Gordin, after World War One, Belgian, French and British scientists organized a boycott of scientists from Germany and Austria. They were blocked from conferences and weren't able to publish in Western European journals. "Increasingly, you have two scientific communities, one German, which functions in the defeated [Central Powers] of Germany and Austria, and another that functions in Western Europe, which is mostly English and French," says Gordin.

    The second effect of World War One took place in the US. Starting in 1917 when the US entered the war, there was a wave of anti-German hysteria that swept the country. In Ohio, Wisconsin and Minnesota there were many, many German speakers. World War One changed all that. "German is criminalized in 23 states. You're not allowed to speak it in public, you're not allowed to use it in the radio, you're not allowed to teach it to a child under the age of 10," says Gordin. The Supreme Court overturned those anti-German laws in 1923, but for years they were the law of the land. What that effectively did, according to Gordin, was decimate foreign language learning in the US resulting in a generation of future scientists who came of age with limited exposure to foreign languages. That was also the moment, according to Gordin, when the American scientific establishment started to take over dominance in the world. "The story of the 20th Century is not so much the rise of English as the serial collapse of German as the up-and-coming language of scientific communication," concludes Gordin.

    323 comments | about a week ago

  • Samsung's Wi-Fi Upgrades Promise Speeds Up to 4.6Gbps

    The Register describes an advance in wireless speed announced by Samsung, which could make possible Wi-Fi speeds of up to 4.6Gbps in any device equipped with the new technology. By using “wide-coverage beam-forming antenna” and “eliminating co-channel interference, regardless of the number of devices using the same network” Samsung says it has cracked the problem and that products using its 802.11 ab standard could go on sale next year. Early products to use the technology will include “audio visual and medical devices, as well as telecommunications equipment.” Samsung also says the technology will be “integral to developments relevant to the Samsung Smart Home and other initiatives related to the Internet of Things.”

    92 comments | about a week ago

  • WhatsApp's Next Version To Include VoIP Calls and Recording

    An anonymous reader writes that WhatsApp is adding a feature that may elevate it for many users' purposes: VoIP. "Apps like Viber, Skype, Tango and Google Hangout already support VoIP, which allows you to make voice calls over a broadband connection. Beyond WhatsApp's huge pool of over 600 million active users, which will undoubtedly disrupt cell service providers' payment model, what is even more intriguing is the VoIP recording feature. With the exception of third-party add-ons available for Skype, no other VoIP app includes this feature."

    65 comments | about a week ago

  • More Details On The 3rd-Party Apps That Led to Snapchat Leaks

    Yesterday we posted a link to Computerworld's reports that (unnamed) third-party apps were responsible for a massive leak of Snapchat images from the meant-to-be-secure service. An anonymous reader writes with some more details: Ars Technica identifies the culprit as SnapSaved, which was created to allow Snapchat users to access their sent and received images from a browser but which also secretly saved those images on a SnapSaved server hosted by HostGator. Security researcher Adam Caudill warned Snapchat about the vulnerability of their API back in 2012, and although the company has reworked their code multiple times as advised by other security researchers, Caudill concludes that the real culprit is the concept behind Snapchat itself. "Without controlling the endpoint devices themselves, Snapchat can't ensure that its users' photos will truly be deleted. And by offering that deletion as its central selling point, it's lured users into a false sense of privacy."

    97 comments | about a week ago

  • Core Secrets: NSA Saboteurs In China and Germany

    Advocatus Diaboli writes with this snippet from The Intercept: The National Security Agency has had agents in China, Germany, and South Korea working on programs that use "physical subversion" to infiltrate and compromise networks and devices, according to documents obtained by The Intercept. The documents, leaked by NSA whistleblower Edward Snowden, also indicate that the agency has used under cover operatives to gain access to sensitive data and systems in the global communications industry, and that these secret agents may have even dealt with American firms. The documents describe a range of clandestine field activities that are among the agency's "core secrets" when it comes to computer network attacks, details of which are apparently shared with only a small number of officials outside the NSA.

    228 comments | about two weeks ago

  • Why the Trolls Will Always Win

    maynard writes: Kathy Sierra spent a tech career developing videogames and teaching Java programming in Sun Microsystems masterclasses. Up until 2007, she'd been a well regarded tech specialist who happened to be female. Until the day she opined on her private blog that given the crap-flood of bad comments, maybe forum moderation wasn't a bad idea. This opinion made her a target. A sustained trolling and harassment campaign followed, comprised of death and rape threats, threats against her family, fabricated claims of prostitution, and a false claim that she had issued a DMCA takedown to stifle criticism. All of this culminated in the public release of her private address and Social Security Number, a technique known as Doxxing. And so she fled from the public, her career, and even her home.

    It turned out that a man named Andrew Auernheimer was responsible for having harassed Sierra. Known as 'Weev', he admitted it in a 2008 New York Times story on Internet Trolls. There, he spoke to the lengths which he and his cohorts went to discredit and destroy the woman. "Over a candlelit dinner of tuna sashimi, Weev asked if I would attribute his comments to Memphis Two, the handle he used to troll Kathy Sierra, a blogger. Inspired by her touchy response to online commenters, Weev said he "dropped docs" on Sierra, posting a fabricated narrative of her career alongside her real Social Security number and address. This was part of a larger trolling campaign against Sierra, one that culminated in death threats."

    Now, seven years later, Kathy Sierra has returned to explain why she left and what recent spates of online harassment against women portend for the future if decent people don't organize. The situation has grown much more serious since she went into hiding all those years ago. It's more than just the threat of Doxxing to incite physical violence by random crazies with a screw loose.
    Read on for the rest of maynard's thoughts.

    716 comments | about two weeks ago

  • AT&T To Repay $80 Million In Shady Phone Bill Charges

    First time accepted submitter dibdublin writes The Federal Trade Commission announced today that AT&T will pay $105 million for hiding extra charges in cellphone bills. The best part of the news? $80 million of it will go back into the pockets of people bilked by AT&T. The FTC announcement reads in part: "As part of a $105 million settlement with federal and state law enforcement officials, AT&T Mobility LLC will pay $80 million to the Federal Trade Commission to provide refunds to consumers the company unlawfully billed for unauthorized third-party charges, a practice known as mobile cramming. The refunds are part of a multi-agency settlement that also includes $20 million in penalties and fees paid to 50 states and the District of Columbia, as well as a $5 million penalty to the Federal Communications Commission."

    61 comments | about two weeks ago

  • Ask Slashdot: Designing a Telecom Configuration Center?

    First time accepted submitter Big Jim Taters (1490261) writes "I have been tasked with helping move our config center from one location to our Headquarters. I have a small budget and no choice in location. I do, however, have an opportunity to design the space fresh (well, kinda.) What we will be configuring is routers, switches, firewalls, and other telecom related devices. What I cannot find is any "Best Practices" or "Lessons Learned" out there. So I ask you fine folks: What are some of the best and worst designs, practices, procedures, and work flows that you have encountered in sitting down to stage anywhere from 2 to 200 devices at once to get configured?"

    52 comments | about two weeks ago

  • James Bamford Releases DOJ Report On NSA Warrantless Wiretapping From 1976

    maynard writes: Investigative Journalist James Bamford knows a thing or two more than most about the National Security Agency. Across his more than three-decade long career digging muck out of exactly those places U.S. government intelligence agencies preferred he wouldn't tread, he's published five books and over eighty press reports. At times, this made for some tense confrontations with intelligence officials from an organization once so secret even few members of Congress knew of its existence.

    For the last several years public focus on the NSA has been on Bush and Obama era reports of illicit domestic spying. From allegations of warrantless wiretapping reported by James Risen in 2005 to secret documents released to journalists at The Guardian by Edward Snowden a year ago. And smack in the middle, Bamford's 2012 revelation of the existence of a huge, exabyte-capable data storage facility then under construction in Bluffdale, Utah.

    Given all this attention on recent events, it might come as a surprise to some that almost forty years ago Senator Frank Church convened a congressional committee to investigate reports of unlawful activities by U.S. intelligence agencies, including illegal domestic wiretapping by the NSA. At the time, Church brought an oversight magnifying glass over what was then half-jokingly referred to as "No Such Agency." And then, like today, James Bamford was in the thick of it, with a Snowden-like cloak-and-dagger game of spy-vs-journalist. It all began by giving testimony before the Church Committee. Writing yesterday in The Intercept, Bamford tells his firsthand historical account of what led him to testify as a direct witness to NSA's wiretapping of domestic communications decades ago and then details the events that led to the publication of his first book The Puzzle Palace back in 1982.
    Read on for more.

    54 comments | about two weeks ago

  • FDA Issues Guidance On Cybersecurity of Medical Devices

    chicksdaddy writes "The Security Ledger reports that the U.S. Food and Drug Administration (FDA) has issued final guidance on Wednesday that calls on medical device manufacturers to consider cyber security risks as part of the design and development of devices. The document, "Content of Premarket Submissions for Management of Cybersecurity in Medical Devices," asks device makers seeking FDA approval of medical devices to disclose any "risks identified and controls in place to mitigate those risks" in medical devices. The guidance also recommends that manufacturers submit documentation of plans for patching and updating the operating systems and medical software that devices run. While the guidance does not have the force of a mandate, it does put medical device makers on notice that FDA approval of their device will hinge on a consideration of cyber risks alongside other kinds of issues that may affect the functioning of the device. Among other things, medical device makers are asked to avoid worst-practices like 'hardcoded' passwords and use strong (multi-factor) authentication to restrict access to devices. Device makers are also urged to restrict software and firmware updates to authenticated (signed) code and to secure inbound and outbound communications and data transfers.

    26 comments | about two weeks ago

  • User Error Is the Primary Weak Point In Tor

    blottsie (3618811) writes with a link to the Daily Dot's "comprehensive analysis of hundreds of police raids and arrests made involving Tor users in the last eight years," which explains that "the software's biggest weakness is and always has been the same single thing: It's you." A small slice: In almost all the cases we know about, it’s trivial mistakes that tend to unintentionally expose Tor users. Several top Silk Road administrators were arrested because they gave proof of identity to Dread Pirate Roberts, data that was owned by the police when Ulbricht was arrested. Giving your identity away, even to a trusted confidant, is always huge mistake. A major meth dealer’s operation was discovered after the IRS started investigating him for unpaid taxes, and an OBGYN who allegedly sold prescription pills used the same username on Silk Road that she did on eBay. Likewise, the recent arrest of a pedophile could be traced to his use of “gateway sites” (such as Tor2Web), which allow users to access the Deep Web but, contrary to popular belief, do not offer the anonymizing power of Tor. "There's not a magic way to trace people [through Tor], so we typically capitalize on human error, looking for whatever clues people leave in their wake," James Kilpatrick, a Homeland Security Investigations agent, told the Wall Street Journal.

    70 comments | about two weeks ago

  • Verizon Wireless Caves To FCC Pressure, Says It Won't Throttle 4G Users

    MetalliQaZ writes Verizon Wireless was scheduled to begin throttling certain LTE users today as part of an expanded "network optimization" program, but has decided not to follow through with the controversial plan after criticism from Federal Communications Commission Chairman Tom Wheeler. All major carriers throttle certain users when cell sites get too congested, but Wheeler and consumer advocates objected to how carriers choose which customers to throttle. The fact that Verizon was throttling only unlimited data users showed that it was trying to boost its profits rather than implementing a reasonable network management strategy, Wheeler said.

    46 comments | about three weeks ago

  • iOS Trojan Targets Hong Kong Protestors

    First time accepted submitter Kexel writes Security researchers have claimed to discover the first Apple iOS Trojan attack in a move to thwart the communications of pro-democracy Hong Kong activists. From the article: "The malicious software, known as Xsser, is capable of stealing text messages, photos, call logs, passwords and other data from Apple mobile devices, researchers with Lacoon Mobile Security said on Tuesday. They uncovered the spyware while investigating similar malware for Google Inc's Android operating system last week that also targeted Hong Kong protesters. Anonymous attackers spread the Android spyware via WhatsApp, sending malicious links to download the program, according to Lacoon. It is unclear how iOS devices get infected with Xsser, which is not disguised as an app."

    72 comments | about three weeks ago

Slashdot Login

Need an Account?

Forgot your password?