Geek Stuff

FTC: Machinima Took Secret Cash To Shill Xbox One

Slashdot -

jfruh writes: The Machinima gaming video network took money from a marketing agency hired by Microsoft to pay "influencers" up to $45,000 to promote the Xbox One. Crucially, the video endorsers did not disclose that they'd been paid, which has caused trouble with the FTC. For its part, Machinima notes that this happened in 2013, when the current management was not in charge.

Read more of this story at Slashdot.

Government Still Hasn't Notified Individuals Whose Personal Data Was Hacked

Slashdot -

schwit1 writes: Months after the federal government admitted publicly that the personal data of more than 20 million government employees had been hacked they still have not sent notifications to those millions. The agency whose data was hacked, the Office of Personnel Management (OPM), said the Defense Department will begin "later this month" to notify employees and contractors across the government that their personal information was accessed by hackers. OPM said notifications would continue over several weeks and "will be sent directly to impacted individuals." OPM also announced that it hired a contractor to help protect the identities and credit ratings of employees whose data was hacked. In a statement, OPM said it had awarded a contract initially worth more than $133 million to a company called Identity Theft Guard Solutions LLC, doing business as ID experts, for identity theft protections for the 21.5 million victims of the security data breach. The contractor will provide credit and identity monitoring services for three years, as well as identity theft insurance, to affected individuals and dependent children aged under 18, the agency said.

Read more of this story at Slashdot.

Barrel o’ Fun: Arcade machine barrel table

Raspberry Pi -

What do you do if you are given a big old wine barrel? You could make it into a twee garden planter; go over Niagara Falls in it; or cut off the end and make a secret passage like in Scooby Doo. Or you could do the obvious thing and build a Raspberry Pi-powered arcade machine. Matt Shaw did just that. Arcade games, wine and Donkey Kong style barrels—three of our favourite things in one.

The arcade machine in all it’s barelly glory

The machine itself has the benefit of a sit-down cocktail cab (you can put your drinks on top) with the standup advantage of being able to jostle your opponent. It’s a nice clean build—deliberately low tech—wired using crimps and block connectors with no soldering. The Raspberry Pi runs the excellent PiPlay, an OS for emulation and gaming.

The other great thing about this project is its scrounginess. Reusing and repurposing makes us happy and this whole project does just that: an unloved 4:3 monitor, free table glass from online classifieds and an old barrel. The main costs were the buttons, joysticks and wiring and the whole build came in at around £90.

The circuit tester is quite brilliant

Although we’ve blogged about Pi-powered arcade machines before (we have two in Pi Towers, we like them, OK? :)) the point is that if you have a Pi lying around then you can make a games machine out of almost anything. For not much money. (And as someone who spent every Saturday feeding their pocket money into arcade machines in seedy arcades in Southport, that’s an amazing thing.)

The post Barrel o’ Fun: Arcade machine barrel table appeared first on Raspberry Pi.

New Russian Laboratory To Study Mammoth Cloning

Slashdot -

An anonymous reader writes: While plans to clone a woolly mammoth are not new, a lab used in a joint effort by Russia and South Korea is. The new facility is devoted to studying extinct animal DNA in the hope of creating clones from the remains of animals found in the permafrost. IBtimes reports: "The Sakha facility has the world's largest collection of frozen ancient animal carcasses and remains, with more than 2,000 samples in its possession, including some that are tens of thousands years old, such as a mammoth discovered on the island of Maly Lyakhovsky; experts believe it may be more than 28,000 years old."

Read more of this story at Slashdot.

UK Health Clinic Accidentally Publishes HIV Status of 800 Patients

Slashdot -

An anonymous reader writes: A sexual health clinic in London accidentally disclosed the HIV positive status of almost 800 patients. The Guardian reports: "The health secretary, Jeremy Hunt, has ordered an inquiry into how the NHS handles confidential medical information after the “completely unacceptable” breach of the privacy of hundreds of HIV patients. The 56 Dean Street clinic in London apologized on Wednesday after sending a newsletter on Tuesday which disclosed the names and email addresses of about 780 recipients. The newsletter is intended for people using its HIV and other sexual health services, and gives details of treatments and support.

Read more of this story at Slashdot.

Despite Reports of Hacking, Baby Monitors Remain Woefully Insecure

Slashdot -

itwbennett writes: Researchers from security firm Rapid7 have found serious vulnerabilities in nine video baby monitors from various manufacturers. Among them: Hidden and hard-coded credentials providing local and remote access over services like SSH or Telnet; unencrypted video streams sent to the user's mobile phone; unencrypted Web and mobile application functions and unprotected API keys and credentials; and other vulnerabilities that could allow attackers to abuse the devices, according to a white paper released Tuesday. Rapid7 reported the issues it found to the affected manufacturers and to US-CERT back in July, but many vulnerabilities remain unpatched.

Read more of this story at Slashdot.

Check Point Introduces New CPU-Level Threat Prevention

Slashdot -

An anonymous reader writes: After buying Israeli startup company Hyperwise earlier this year, Check Point Software Technologies (Nasdaq: CHKP) now unveils its newest solution for defeating malware. Their new offering called SandBlast includes CPU-Level Threat Emulation that was developed in Hyperwise which is able to defeat exploits faster and more accurately than any other solution by leveraging CPU deubgging instruction set in Intel Haswell, unlike known anti-exploitation solutions like kBouncer or ROPecker which use older instruction sets and are therefore bypassable. SandBlast also features Threat Extraction — the ability to extract susceptible parts from incoming documents.

Read more of this story at Slashdot.

"Extremely Critical" OS X Keychain Vulnerability Steals Passwords Via SMS

Slashdot -

Mark Wilson writes: Two security researchers have discovered a serious vulnerability in OS X that could allow an attacker to steal passwords and other credentials in an almost invisible way. Antoine Vincent Jebara and Raja Rahbani — two of the team behind the myki identity management security software — found that a series of terminal commands can be used to extract a range of stored credentials. What is particularly worrying about the vulnerability is that it requires virtually no interaction from the victim; simulated mouse clicks can be used to click on hidden buttons to grant permission to access the keychain. Apple has been informed of the issue, but a fix is yet to be issued. The attack, known as brokenchain, is disturbingly easy to execute. Ars reports that this weakness has been exploited for four years.

Read more of this story at Slashdot.

You Don't Have To Be Good At Math To Learn To Code

Slashdot -

HughPickens.com writes: Olga Khazan writes in The Atlantic that learning to program involves a lot of Googling, logic, and trial-and-error—but almost nothing beyond fourth-grade arithmetic. Victoria Fine explains how she taught herself how to code despite hating math. Her secret? Lots and lots of Googling. "Like any good Google query, a successful answer depended on asking the right question. "How do I make a website red" was not nearly as successful a question as "CSS color values HEX red" combined with "CSS background color." I spent a lot of time learning to Google like a pro. I carefully learned the vocabulary of HTML so I knew what I was talking about when I asked the Internet for answers." According to Khazan while it's true that some types of code look a little like equations, you don't really have to solve them, just know where they go and what they do. "In most cases you can see that the hard maths (the physical and geometry) is either done by a computer or has been done by someone else. While the calculations do happen and are essential to the successful running of the program, the programmer does not need to know how they are done." Khazan says that in order to figure out what your program should say, you're going to need some basic logic skills and you'll need to be skilled at copying and pasting things from online repositories and tweaking them slightly. "But humanities majors, fresh off writing reams of term papers, are probably more talented at that than math majors are."

Read more of this story at Slashdot.

Second Gen Moto 360 Men's and Women's, Fitness-Oriented Moto 360 Sport Unveiled

Slashdot -

MojoKid writes: Motorola's first generation Moto 360 smartwatch was one of the first Android Wear smartwatches to hit the market, and because of its round display, became the immediate flag bearer for the Android Wear platform. As new competition has entered the fray — including entries from Apple with the Apple Watch and Samsung with the Gear S2 — Motorola is announcing a second generation smartwatch that solves most of the complaints of the previous model. Motorola has ditched the archaic Texas Instruments OMAP 3 processor in the original Moto 360. The new second generation Moto 360 brings a more credible 1.2GHz, quad-core Qualcomm Snapdragon 400 processor and Adreno 305 graphics to the table. You'll also find 512MB of RAM and 4GB of storage. And if you didn't like the largish dimensions of the previous Moto 360, you'll be glad to know that Motorola is offering two sizes this time around. There's a 46mm diameter case that comes with a 360x330 display and a smaller 42mm diameter case that houses a 360x325 display. Motorola has also introduced a dedicated women's model of the Moto 360 which features a 42mm diameter case and accepts smaller 16mm bands. As for battery life, Motorola says that the men's and women's 42mm models comes with a 300 mAh battery which is good for up to 1.5 days of mixed use, while the 46mm watch comes with a larger 400 mAh battery which is good for up to 2 days on charge.

Read more of this story at Slashdot.

Intel launches Atom Z3590 chip for phones, tablets

Liliputing -

The Intel Atom Z3580 processor that powers the Asus Zenfone 2 I tested recently is pretty fast. But now Intel has an even faster chip designed for smartphones and tablets. The new Atom Z3590 is based on the same “Moorefield” architecture as the Z3580, but it supports faster CPU and graphics burst speeds. Intel’s new chip supports […]

Intel launches Atom Z3590 chip for phones, tablets is a post from: Liliputing

Netflix Open Sources Sleepy Puppy XSS Hunter

Slashdot -

msm1267 writes: Netflix has released a tool it calls Sleepy Puppy. The tool injects cross-site scripting payloads into a target app that may not be vulnerable, but could be stored in a database and tracks the payload if it's reflected to a secondary application that makes use of the data in the same field. "We were looking for a way to provide coverage on applications that come from different origins or may not be publicly accessible," said co-developer Scott Behrens, a senior application security engineer at Netflix. "We also wanted to observe where stored data gets reflected back, and how data that may be stored publicly could also be reflected in a large number of internal applications." Sleepy Puppy is available on Netflix's Github repository and is one of a slew of security tools its engineers have released to open source.

Read more of this story at Slashdot.

Why Do So Many Tech Workers Dislike Their Jobs?

Slashdot -

Nerval's Lobster writes: So what if you work for a tech company that offers free lunch, in-house gym, and dry cleaning? A new survey suggests that a majority of software engineers, developers, and sysadmins are miserable. Granted, the survey in question only involved 5,000 respondents, so it shouldn't be viewed as comprehensive (it was also conducted by a company that deals in employee engagement), but it's nonetheless insightful into the reasons why a lot of tech pros apparently dislike their jobs. Apparently perks don't matter quite so much if your employees have no sense of mission, don't have a clear sense of how they can get promoted, and don't interact with their co-workers very well. While that should be glaringly obvious, a lot of companies are still fixated on the idea that minor perks will apparently translate into huge morale boosts; but free smoothies in the cafeteria only goes so far.

Read more of this story at Slashdot.

Lenovo launches a bunch of bizarre phones (with huge screens, dual selfie cameras, big batteries, etc)

Liliputing -

Lenovo may be in the process of streamlining its smartphone operation by merging the Motorola and Lenovo phone teams and putting them under the leadership of the folks who brought us phones like the popular Moto G and Moto X series. But that hasn’t stopped the company from unveiling a bunch of phones with odd, […]

Lenovo launches a bunch of bizarre phones (with huge screens, dual selfie cameras, big batteries, etc) is a post from: Liliputing

Why Law Enforcement Professionals Should Support CalECPA

EFF's Deeplinks -

The California Legislature is on the brink of passing S.B. 178, the California Electronic Communications Privacy Act (CalECPA). This bill would bring long overdue reforms to how law enforcement searches our digital records by requiring a warrant to access our emails, locational information, documents, and other files.

This week, we’re happy to report that all of the state’s major law enforcement associations removed their opposition, taking a neutral stance on the legislation. Beyond that, the San Diego Police Officers Association (SDPOA), representing 1,850 sworn officers, joins the California Correctional Peace Officers Association (CCPOA) in supporting CalECPA.

As SDPOA President Brian Marvel wrote in a letter to the bill’s author Sen. Mark Leno:

In its current form, SB 178 strengthens community relationships and increases transparency without impeding on law enforcement’s ability to serve the needs of their communities. This bill does so by providing a clear process for government or law enforcement agencies seeking access to electronic information such as data stored on cell phones, electronic devices, emails, and digital documents.

SB 178 modernizes the current law to account for assuring privacy of personal information of Californians regardless of the format in which it is stored. We believe this bill is in the best interest of all citizens of California. 

This letter underscores what EFF also strongly believes—privacy  is not in conflict with public safety. Instead, updating electronic privacy law for the modern digital age protects people in two ways: safeguarding rights and supporting police’s ability to effectively and efficiently do their jobs.

CalECPA creates a clear standard for government searches

Currently, the law and court rulings have generated a lot of complexity about when a warrant is required for digital records, particularly those held by third party online services, such as Google or Twitter.  Some companies say that they require a warrant for data. Others do not. S.B. 178 would create a unified standard across the state, allowing investigators to know exactly what they need to do to get the information they need. With a clearly defined law, investigators can be more confident that they followed due process when they bring a case against a suspect.

CalECPA does not hinder law enforcement’s ability to react to emergencies

Generally, investigators would need to get a warrant before accessing data. But, in emergency situations—when there is danger of death or serious bodily injury—police can proceed, as long as they later explain the emergency to the court . This is a meaningful accountability measure that also serves the interests of public safety.

Law enforcement officers also deserve privacy guarantees 

Being a police officer and being a member of the public are not mutually exclusive. In other words, when the legislature protects the privacy of Californians, that includes law enforcement officers, and their families, too.

CalECPA improves trust between police and the community

Over the last few years, local law enforcement agencies have come under intense scrutiny over the use of sophisticated surveillance technologies, often without limit. By supporting S.B. 178, SDPOA has sent a clear message that its members support privacy as a community value and their commitment to finding the right balance between civil liberties and public safety.

The time is now for other California law enforcement to also stand up and support S.B. 178.

Related Issues: PrivacyRelated Cases: California's Electronic Communications Privacy Act (CalECPA) - SB 178
Share this:   ||  Join EFF

How Open Film Project "Cosmos Laundromat" Made Blender Better

Slashdot -

An anonymous reader writes: At the beginning of August the Blender Institute released Cosmos Laundromat: First Cycle, its seventh open project. More than just a 10-minute short film, Cosmos Laundromat is the Blender Institute's most ambitious project, a pilot for the first fully free and open animated feature film. In his article on Opensource.com animator and open source advocate Jason van Gumster highlights the film project and takes a look at some of its most significant contributions to the Blender open source project.

Read more of this story at Slashdot.

Lenovo Yoga Tab 3 Android tablets coming this fall

Liliputing -

Lenovo is updating its mid-range line of Android tablets with the new Lenovo Yoga Tab 3. It comes in 8 and 10 inch sizes, and both versions sport 1280 x 800 pixel displays, 1.3 GHz quad-core Qualcomm APQ8009 processor, 1GB of RAM, and 16GB of storage. While those specs might seem a bit underwhelming, there are […]

Lenovo Yoga Tab 3 Android tablets coming this fall is a post from: Liliputing

Mutt 1.5.24 Released

Slashdot -

kthreadd writes: Version 1.5.24 of the Mutt email client has been released. New features in this release includes among other things terminal status-line (TS) support, a new color object 'prompt', the ability to encrypt postponed messages and opportunistic encryption which automatically enables/disables encryption based on message recipients. SSLv3 is now also disabled by default.

Read more of this story at Slashdot.

Lenovo Yoga Tab 3 Pro has its own projector, 4 speakers

Liliputing -

Lenovo is updating its Yoga line of Android tablets, and the top-of-the-line model has some fairly unusual features including a built-in projector and four speakers. The Lenovo Yoga Tab 3 Pro isn’t the first tablet-with-a-projector from Lenovo. Last year’s 13 inch Yoga Tablet 2 Pro had one as well, but the new model has a faster processor […]

Lenovo Yoga Tab 3 Pro has its own projector, 4 speakers is a post from: Liliputing

Can Living In Total Darkness For 5 Days "Reset" the Visual System?

Slashdot -

the_newsbeagle writes: That's what one neuroscientist is aiming to find out. He wants to put patients with a type of amblyopia, the vision problem commonly called lazy eye, into the dark for 5 days. His hypothesis: When they emerge, their brains' visual cortices will be temporarily "plastic" and changeable, and may begin to process the visual signals from their bad eyes correctly. Before he could do this study, though, he had to do a test run to figure out logistics. So he himself lived in a pitch black room for 5 days. One finding: Eating ravioli in the dark is hard.

Read more of this story at Slashdot.

Pages

Subscribe to debianHELP aggregator - Geek Stuff