4 Calif. Students Arrested For Alleged Mass-Killing Plot

“Guns didn’t change, society did, for the worse…”

Yep. About time that second amendment was updated to reflect the modern military prowess of the United States, and the lack of the need for ‘militias’.

Article source: http://rss.slashdot.org/~r/Slashdot/slashdot/~3/5NwDPsiadVw/4-calif-students-arrested-for-alleged-mass-killing-plot

Posted in Linux News | Tagged | Leave a comment

Google Lets Advertisers Target By (Anonymized) Customer Data

Users can control the ads they see, including Customer Match ads, by opting out of personalized ads or by muting or blocking ads from individual advertisers through Google Ads Settings.

Article source: http://rss.slashdot.org/~r/Slashdot/slashdot/~3/AUubm1LoZSs/google-lets-advertisers-target-by-anonymized-customer-data

Posted in Linux News | Tagged | Leave a comment

TiVo’s Latest Offering Detects and Skips Ads, Adds 4K Capability

Forgot your password?

Article source: http://rss.slashdot.org/~r/Slashdot/slashdot/~3/XMwMKc7Fo-Q/tivos-latest-offering-detects-and-skips-ads-adds-4k-capability

Posted in Linux News | Tagged | Leave a comment

An Ice House Design Concept For Mars Bets Long On Liquid Water

A transparent and fully closed ETFE membrane reinforced with tensile Dyneema is deployed from the lander and inflated to form a pressurized boundary between the lander and the Martian exterior. This membrane, precision manufactured on Earth, is critical protection for the future ice shell, preventing any printed ice from sublimating into the atmosphere.

Article source: http://rss.slashdot.org/~r/Slashdot/slashdot/~3/N0HZv4JNMrk/an-ice-house-design-concept-for-mars-bets-long-on-liquid-water

Posted in Linux News | Tagged | Leave a comment

3 Scientists Share Nobel For Parastic Disease Breakthroughs

All scholarship is, to some extent, built on prior work — but this is especially true in scientific research. Consider James P. Allison, the winner of this year’s Lasker-DeBakey prize in clinical medical research. His work helped clarify one way cancer cells hide from the immune system.
Dr. Allison’s work is surely impressive. But [...]it relied on work conducted by 7,000 scientists at 5,700 institutions over a hundred-year period. Yet only he was recognized.

Article source: http://rss.slashdot.org/~r/Slashdot/slashdot/~3/BvQJ6yHGRAs/3-scientists-share-nobel-for-parastic-disease-breakthroughs

Posted in Linux News | Tagged | Leave a comment

Sex, Drugs, and Transportation: How Politicians Tried To Keep Uber Out of Vegas

Slashdot is powered by your submissions, so send in your scoop

Article source: http://rss.slashdot.org/~r/Slashdot/slashdot/~3/mmAHDY70HQA/sex-drugs-and-transportation-how-politicians-tried-to-keep-uber-out-of-vegas

Posted in Linux News | Tagged | Leave a comment

Majority of EU Nations Seek Opt-Out From Growing GM Crops

Sex, Drugs, and Transportation: How Politicians Tried To Keep Uber Out of Vegas


Article source: http://rss.slashdot.org/~r/Slashdot/slashdot/~3/PBtBV1vVQHs/majority-of-eu-nations-seek-opt-out-from-growing-gm-crops

Posted in Linux News | Tagged | Leave a comment

AdBlock flogged to ‘mystery buyer ‘ … aka Adblock Plus

AdBlock has been flogged off to a mystery buyer – and our sources have pointed to Adblock Plus as the shy purchaser. Such a move that would double the scope of Adblock Plus’s empire.

Within its headline announcement yesterday that it had been bought by an unnamed outfit, AdBlock said it is now participating in German competitor AdBlock Plus’ Acceptable Ads program, which sets the criteria for whether publishers and websites can be unblocked by its filter.

Once they get the green light, larger advertisers must pay ABP a fee for their ads to appear in people’s browsers. ABP has refused to disclose which advertisers pay it cash, or how much revenue it makes. Of course, users can override which ads are allowed through, and block whatever they want – or everything.

The AdBlock gobble follows the announcement earlier this week that Adblock Plus, which is owned by Eyeo GmbH, will farm out its evaluation process for unblocking adverts to an independent reviewer in a bid to be “100 per cent transparent.”

Michael Gundlach, founder of AdBlock, said the company had “always shared a similar goal to Adblock Plus, who created the acceptable ads program.”

“But I do not like the fact they also control the program, because they are supported by Acceptable Ads advertisers. Now Adblock Plus will be transferring custodianship of Acceptable Ads to an impartial,” he added.

“I love this idea, in fact it was my wife Katie’s suggestion. Due to this change, I’m happy for Adblock to join the program. As a result I am selling my company, and the buyer is turning on Acceptable Ads. My long-term managing director will keep working with the new company. I believe this is a great time for you users.”

Bernd Rubel, editor of German website Mobile Geeks, which has been covering Eyeo for several years, told The Register earlier this week that several trusted sources said AdBlock was about to be purchased by AdBlock Plus.

He said the takeover will become obvious once an automatic update of the browser extension is pushed out to people. “If both Adblock and Adblock Plus include the Acceptable Ads, Eyeo doubles the reach of the advertisements and has nearly 100 million users,” Rubel told us.

According to AdBlock it is “the most popular Google Chrome extension”, with more than 40,000,000 users. ®

Analyzing the economic value of IBM FlashSystem

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2015/10/02/adblock_flogged_off_to_mystery_buyer/

Posted in Linux News | Tagged | Leave a comment

Experian-T-Mobile US hack: ‘We trusted them, now that trust is broken’

Analysis The IT security breach that spilt the personal details of an estimated 15 million T-Mobile US phone contract applicants has thrown a new spotlight on the risks of breaches at third-party companies.

T-Mobile’s own systems weren’t compromised. Rather, the source of the leak was Experian, the company that processed the carrier’s credit applications.

Experian reckons the data lifted from its computers included names, addresses, and dates of birth that were stored unencrypted. No payment card or banking information was leaked. But the hacked databases also included encrypted fields containing such information as “Social Security number and ID number (such as driver’s license or passport number), and additional information used in T-Mobile’s own credit assessment” – and “encrypted” may actually be too strong a word.

“Experian has determined that this encryption may have been compromised. We are working with Experian to take protective steps for all of these consumers as quickly as possible,” T-Mobile US chief exec John Legere said in a letter to customers.

The leak was an “isolated incident over a limited period of time,” according to Experian – where “limited period” should be taken to mean several years. Unidentified hackers obtained access to a server that contained personal information for consumers who applied for T-Mobile USA postpaid services between September 1, 2013 and September 16, 2015. Law enforcement agencies have been notified.

“This is yet another example of a ‘long lived’ attack which has taken years to come to light and of a third party provider who ‘lost’ information that was entrusted to them,” said Guy Bunker, VP of products at security software firm Clearswift.

Experian is notifying the individuals who may have been affected and is offering free credit monitoring and identity resolution services for two years, and it says it has taken additional (unspecified) security steps to help prevent future incidents.

Somewhat ironically, Experian has become a leading supplier of credit protection services that monitor whether consumer data exposed through leaks has actually been abused in attempts to carry out identity theft. Clients expect the highest level of security from Experian, whose reputation has now been called into question by the T-Mobile data breach.

“While [Experian] say that this is only a part of their business, how can we be sure?” Bunker said. “After all it has been happening for two years without their knowledge. Can we be 100 per cent sure there is not more malware in their infrastructure they haven’t found yet? How confident can we now be that they have adequate security solutions across the business to prevent data loss?”

The biggest immediate danger is that leaked data from the breach could be used to put together especially convincing phishing attacks designed to extract missing pieces of information needed to carry out identity fraud or other such scams.

“The information stolen from Experian can be combined with data from other sources and potentially used in sophisticated attacks,” said data loss prevention expert Gord Boyce, chief exec of FinalCode. “It’s become commonplace to offer credit monitoring to victims of a data privacy breach, but other attacks could fall outside the monitored time period.”

Mark James, security specialist at IT security firm ESET, added, “End users data will be used for criminal activity that could include identity theft or more targeted attacks to gain as much info as possible from this breach. As T-Mobile were the initiating holder of the data they will need to answer to the public and offer some kind of financial protection for anyone affected that may include credit protection services.”

Luke Brown, VP at data loss prevention firm Digital Guardian, said, “While many businesses are placing more emphasis on their own data protection these days, it’s easy to forget third parties in the supply chain pose just as much of a risk to security. Simply assuming that suppliers and partners have adequate protection in place isn’t good enough, steps must be taken to ensure that critical customer information is protected regardless of where it is in the supply chain.”

“Ultimately, T-Mobile’s customers aren’t going to care where and how the breach occurred, the bottom line is they trusted T-Mobile with their sensitive data and now that trust is broken,” Brown added. ®

VersaStack at-a-glance brochure

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2015/10/02/experian_t_mobile_breach_analysis/

Posted in Linux News | Tagged | Leave a comment

Five million people exposed in Scottrade brokerage hack

If you’ve bought shares using retail broker Scottrade in the last few years, you may want to get in touch with the biz because its servers have been plundered by hackers unknown.

The firm only found out about the data breach when the Feds got in contact to let it know. It now appears that 4.6 million customer accounts have been compromised. The IT security breach occurred between “late 2013 and early 2014″, and the intruders primarily went after customer names and addresses, we’re told.

“Although Social Security numbers, email addresses, and other sensitive data were contained in the system accessed, it appears that contact information was the focus of the incident,” the firm said in a statement.

“We have no reason to believe that Scottrade’s trading platforms or any client funds were compromised. Client passwords remained fully encrypted at all times and we have not seen any indication of fraudulent activity as a result of this incident. We have secured the known intrusion point and conducted an internal data forensics investigation on this incident with assistance from a leading computer security firm.”

If you’ve used Scottrade to buy stocks since February 2014 you may be receiving a notice from the firm if your account has been compromised. The biz is offering the now-traditional one year of credit protection services, but – based on the information targeted – it’s more likely that you’ll be deluged with spam.

Scottrade is one of the larger retail brokers out there, and a mailing list of users would be very useful for stock scammers. Expect to get a lot of offers for penny stocks that are about to explode in value, sent by the pump-and-dump merchants, as well as offers for stocks that look too good to be true (hint: they are).

Nevertheless, it’s a worrying sign of poor computer security that a company doesn’t realize it was hit two years ago and only finds out when the Feds came calling. The IT staff at Scottrade will be getting a boot up the backside from management, one imagines. ®

VersaStack at-a-glance brochure

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2015/10/02/scottrade_data_breach_46m_customers/

Posted in Linux News | Tagged | Leave a comment