×

Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!

  • GCHQ Warns It Is Losing Track of Serious Criminals

    An anonymous reader writes The Telegraph reports, "GCHQ has lost track of some of the most dangerous crime lords and has had to abort surveillance on others after Edward Snowden revealed their tactics ... The spy agency has suffered "significant" damage in its ability to monitor and capture serious organized criminals following the exposes by the former CIA contractor. Intelligence officers are now blind to more than a quarter of the activities of the UK's most harmful crime gangs after they changed their communications methods in the wake of the Snowden leaks. One major drug smuggling gang has been able to continue flooding the UK with Class A narcotics unimpeded for the last year after changing their operations. More intense tracking of others has either been abandoned or not started because of fears the tactics are now too easy to spot and will force the criminals to "go dark" and be lost sight of completely."

    139 comments | 3 hours ago

  • Finland Announces an Anti-Laser Campaign For Air Traffic

    jones_supa writes Trafi, the Finnish Pilots' Association, and STUK, the Finnish Radiation and Nuclear Safety Authority, have launched a joint campaign against air traffic interference with the title "Lasers Are Not Toys." Ilkka Kaakinen from Trafi says that laser pointers interfering with air traffic is a real problem in Finland. "We receive reports of several cases of laser interference every month and every one of them is potentially dangerous," Kaakinen says. Last year, 60 cases of laser pointer interference were reported in Finland, and the figure for this year was at 58 in November. Despite the continuing interference, only one person has been caught misusing a laser pointer in this way in Finland. That single person was not convicted of a crime, as the court was not able to establish intent. Kaakinen says other countries hand down severe punishments for interfering with air traffic, even years-long stretches in prison. He also reminds that it is important for users of laser pointers to understand that the devices are not toys, and that children should be warned of the potential danger in using them irresponsibly – or ideally, not given one at all.

    108 comments | yesterday

  • Bitcoin Exec To Spend Two Years Behind Bars For Silk Road Transactions

    mrspoonsi writes Charlie Shrem, former Bitcoin Foundation board member and CEO of the now-defunct exchange BitInstant, has been sentenced to two years in prison for helping Silk Road users anonymously swap cash for digital currency. Silk Road, as you know, was the online marketplace infamous for hosting anonymous drug and gun sales that was busted by the FBI back in 2013. A version 2.0 went up shortly after that, but it suffered the same fate as its predecessor this November. Based on evidence gathered during the crackdown, Shrem agreed to partner with Robert M. Faiella to trade over $1 million in cash from buyers. Faiella was the one with direct contact to buyers, hiding behind the name BTCKing to post ads promoting his dollar-to-Bitcoin business on the marketplace.

    67 comments | yesterday

  • 65,000 Complaints Later, Microsoft Files Suit Against Tech Support Scammers

    MojoKid (1002251) writes Tech support scammers have been around for a long time and are familiar to most Slashdot readers. But last month, the Federal Trade Commission (FTC) announced that it had issued lawsuits against several culprits responsible for tech support scams. Now Microsoft has announced that it too is going after tech support scammers. According to the company, more than 65,000 complaints have been made about tech support scams since May of this year alone. Bogus technicians, pretending to represent Microsoft, call the house offering fake tech support and trick people into paying hundreds of dollars to solve a non-existent issue. If successful in their ruse, the scammer then gains access to a person's computer, which lets them steal personal and financial information and even install malware. I managed to keep one of these guys on the phone for about 20 minutes while I stumbled through his directions, over and over, "rebooting," pretending to be using Windows, etc; the next one caught on my quickly. Have they called you? If so, how did the call go?

    235 comments | 2 days ago

  • Staples: Breach May Have Affected 1.16 Million Customers' Cards

    mpicpp writes with this excerpt from Fortune: Staples said Friday afternoon that nearly 1.16 million customer payment cards may have been affected in a data breach under investigation since October. The office-supply retailer said two months ago that it was working with law enforcement officials to look into a possible hacking of its customers' credit card data. Staples said in October that it had learned of a potential data theft at several of its U.S. stores after multiple banks noticed a pattern of payment card fraud suggesting the company computer systems had been breached. Now, Staples believes that point-of-sale systems at 115 Staples locations were infected with malware that thieves may have used to steal customers' names, payment card numbers, expiration dates and card verification codes, Staples said on Friday. At all but two of those stores, the malware would have had access to customer data for purchases made between August 10 and September 16 of this year. At the remaining two stores, the malware was active from July 20 through September 16, the company said.

    97 comments | 2 days ago

  • All the Evidence the Government Will Present In the Silk Road Trial Is Online

    apexcp writes: In less than a month, one of the biggest trials of 2015 will begin in New York City. The full list of government evidence and defense objections found its way online recently, shedding light on both the prosecutor's courtroom strategy and the defense team's attempted rebuttals. Also important is what's not presented as evidence. There's not a single piece of forensic documentation about how the FBI originally found Silk Road servers, an act the defense has called "blatantly criminal."

    51 comments | 2 days ago

  • FBI Confirms Open Investigation Into Gamergate

    v3rgEz writes In a terse form letter responding to a FOIA request, the FBI has confirmed it has an open investigation into Gamergate, the loose but controversial coalition of gamers calling for ethics in gaming journalism — even as some members have harassed and sent death threats to female gaming developers and critics.

    551 comments | 3 days ago

  • Did Alcatraz Escapees Survive? Computer Program Says They Might Have

    In June of 1962, three prisoners escaped the penitentary on Alcatraz, in an elaborate plot that was dramatized in a Clint Eastwood movie. A question that has long puzzled the public is whether these men ever made it to shore; the many factors that made Alcatraz a secure prison include sharks, cold water, and contrary currents. Still, some artifacts from the attempt, and perhaps the appeal of stories about survival against high odds, have led many people to believe that the men actually landed safely and faded into society. coondoggie writes This week Dutch scientists from Delft University of Technology presented findings from a computer modeling program they were working on, unrelated to the mystery, that demonstrated the escapees could have survived the journey. "In hindsight, the best time to launch a boat from Alcatraz was [11:30 am], one and a half hours later than has generally been assumed. A rubber boat leaving Alcatraz at [11:30 am] would most likely have landed just north of the Golden Gate Bridge. The model also shows that debris in that scenario would be likely to wash up at Angel Island, exactly where one of the paddles and some personal belongings were found.

    87 comments | 4 days ago

  • Councilmen Introduce Bills Strongly Regulating UAV Use in NYC

    SternisheFan passes on this excerpt from an Ars Technica article: On Wednesday Councilman Dan Garodnick introduced a bill to the New York City council seeking to ban all use of drones except those operated by police officers who obtain warrants. A second, parallel bill introduced by councilman Paul Vallone would place more stringent restrictions on drone use but stop short of banning drones for hobbyists and companies altogether. Both bills have been passed to the city's committee on public safety. An all-out ban on drones within the metropolis would be a quite wide-reaching step, especially as the Federal Aviation Authority (FAA) seems poised to adopt more permissive rules, with respect to commercial interests in particular. Earlier this year, the FAA formally granted six Hollywood companies exemptions to drone ban rules. A couple of months later, the FAA granted similar exemptions for construction site monitoring and oil rig flare stack inspections. The article explains that Vallone's bill is less restrictive, and rather than propose an outright ban "lists 10 instances where operating a UAV would be illegal, including at night, out of the operator's eyesight, or above 400 ft high. Outside of those conditions, hobbyists and commercial interests would be free to fly drones."

    68 comments | 4 days ago

  • RFID-Blocking Blazer and Jeans Could Stop Wireless Identity Theft

    An anonymous reader writes A pair of trousers and blazer have been developed by San Francisco-based clothing company Betabrand and anti-virus group Norton that are able to prevent identity theft by blocking wireless signals. The READY Active Jeans and the Work-It Blazer contain RFID-blocking fabric within the pockets' lining designed to prevent hacking through radio frequency identification (RFID) signals emitted from e-passports and contactless payment card chips. According to the clothing brand, this form of hacking is an increasing threat, with "more than 10 million identities digitally pick pocketed every year [and] 70% of all credit cards vulnerable to such attacks by 2015."

    110 comments | 4 days ago

  • Over 9,000 PCs In Australia Infected By TorrentLocker Ransomware

    First time accepted submitter River Tam writes Cybercriminals behind the TorrenLocker malware may have earned as much as $585,000 over several months from 39,000 PC infections worldwide, of which over 9,000 were from Australia. If you're a Windows user in Australia who's had their files encrypted by hackers after visiting a bogus Australia Post website, chances are you were infected by TorrentLocker and may have contributed to the tens of thousands of dollars likely to have come from Australia due to this digital shakedown racket.

    83 comments | 4 days ago

  • Sony Pictures Leak Reveals Quashed Plan To Upload Phony Torrents

    retroworks writes Motherboard.vice offers an interesting scoop from the hacked Sony Pictures email trove. A plan championed by Polish marketing employee Magda Mastalerz was to upload false versions of highly-pirated Sony programming, effectively polluting torrent sites with false positives. For example, a "Hannibal"-themed anti-piracy ad to popular torrent sites disguised as the first episode. Sony Pictures legal department quashed the idea, saying that if pirate sites were illegal, it would also be illegal for Sony Pictures to upload onto them. There were plans in WW2 to drop phony counterfeit currency to disrupt markets, and I wonder why flooding underground markets with phony products isn't widespread. Why don't credit card companies manufacture fake lists of stolen credit card numbers, or phony social security numbers, for illegal trading sites? For that matter, would fake ivory, fake illegal porn, and other "false positives" discourage buyers? Or create alibis?

    130 comments | about a week ago

  • Tracking the Mole Inside Silk Road 2.0

    derekmead writes: The arrest of the Silk Road 2.0 leader and subsequent seizure of the site was partially due to the presence of an undercover U.S. Department of Homeland Security agent, who "successfully infiltrated the support staff involved in running the Silk Road 2.0 website," according to the FBI.

    Referencing multiple interviews, publicly available information, and parts of the moderator forum shared with me, it appears likely that the suspicions of many involved in Silk Road 2.0 are true: the undercover agent that infiltrated the site was a relatively quiet staff member known as Cirrus.

    81 comments | about two weeks ago

  • Apple, IBM Partnership Yields First Results: 10 Mobile Apps

    itwbennett writes IBM and Apple have unveiled the first results of the enterprise IT partnership they announced in July: 10 mobile applications aimed at businesses in six industries as well as government users. One of the apps, for example, allows a flight crew to personalize a passenger's in-flight experience. An app targeted at the banking industry allows a financial advisor to remotely access and manage a client's portfolio. And police officers can use iPhones to view video feeds from crime scenes with an app for law enforcement.

    53 comments | about two weeks ago

  • Fraud Bots Cost Advertisers $6 Billion

    Rambo Tribble writes A new report claims that almost a quarter of the "clicks" registered by digital advertisements are, in fact, from robots created by cyber crime networks to siphon off advertising dollars. The scale and sophistication of the attacks which were discovered caught the investigators by surprise. As one said, "What no one was anticipating is that the bots are extremely effective of looking like a high value consumer."

    190 comments | about two weeks ago

  • Uber Banned In Delhi After Taxi Driver Accused of Rape

    RockDoctor writes BBC News is reporting that a 26-year old Indian woman is alleging rape against a driver for the embattled Uber transport-managing company. In a post on the Uber blog, one "Saad Ahmed" implicitly admits that the driver was a Uber driver, that the lift was arranged through Uber's service, and that the full range of Uber's safety mechanisms had been applied to his employment, and by implication, that Uber accepts some culpability for putting this (alleged) rapist into contact with his (alleged) victim. "Our initial investigations have revealed shortcomings of the private cab company which didn't have GPS installed in its cabs and the staff wasn't verified," Delhi Special Commissioner Deepak Mishra said. But Uber says safety was paramount, and added it had GPS traces of all journeys. "We work with licensed driver-partners to provide a safe transportation option, with layers of safeguards such as driver and vehicle information, and ETA-sharing [estimated time of arrival] to ensure there is accountability and traceability of all trips that occur on the Uber platform," its statement added.

    180 comments | about two weeks ago

  • Ask Slashdot: Can a Felon Work In IT?

    First time accepted submitter Lesrahpem writes I'm a felon with several prior misdemeanor convictions from an immature time in my life. I've since cleaned up my act, and I want to go back into the IT sector. I keep running into potential employers who tell me they'd like to hire me but can't because of my past record (expunging won't work, I'm in Ohio). Does anyone have any suggestions for me? Should I just give up and change careers?"

    720 comments | about two weeks ago

  • Man Caught Trying To Sell Plans For New Aircraft Carrier

    New submitter cyberjock1980 tips news that an engineer has been caught trying to deliver schematics for an aircraft carrier to the Egyptian government. The 35-year-old civilian received security clearance four months ago after working for the U.S. Navy since February. FBI agents made contact with him, pretending to be with the Egyptian government. They struck a deal to buy documents about the U.S.S. Gerald R. Ford, the first in a new line of improved, nuclear-powered aircraft carriers. The man sold four CAD drawings for the carrier, and was later seen photographing another set of schematics. A bond hearing is scheduled for Wednesday.

    388 comments | about two weeks ago

  • DOJ Launches New Cybercrime Unit, Claims Privacy Top Priority

    msm1267 writes: Leslie Caldwell, assistant attorney general in the criminal division of the Department of Justice, announced on Thursday the creation of a new Cybercrime Unit, tasked with enhancing public-private security efforts. A large part of the Cybersecurity Unit's mission will be to quell the growing distrust many Americans have toward law enforcement's high-tech investigative techniques. (Even if that lack of trust, as Caldwell claimed, is based largely on misinformation about the technical abilities of the law enforcement tools and the manners in which they are used.) "In fact, almost every decision we make during an investigation requires us to weigh the effect on privacy and civil liberties, and we take that responsibility seriously," Caldwell said. "Privacy concerns are not just tacked onto our investigations, they are baked in."

    61 comments | about two weeks ago

  • The Sony Pictures Hack Was Even Worse Than Everyone Thought

    An anonymous reader writes with today's installment of Sony hack news. "It's time to take a moment of silence for Sony Pictures, because more startling revelations about leaked information just came out and employees are starting to panic. BuzzFeed raked through some 40 gigabytes of data and found everything from medical records to unreleased scripts. This is probably the worst corporate hack in history. Meanwhile, Fusion's Kevin Roose is reporting on what exactly happened at Sony Pictures when the hack went down. The hack was evidently so extensive that even the company gym had to shut down. And once the hackers started releasing the data, people started 'freaking out,' one employee said. That saddest part about all of this is that the very worst is probably still to come. Hackers say they stole 100 terabytes of data in total. If only 40 gigabytes contained all of this damning information, just imagine what 100 terabytes contains."

    528 comments | about two weeks ago

Slashdot Login

Need an Account?

Forgot your password?