Slashdot

Syndicate content Slashdot
News for nerds, stuff that matters
Updated: 5 min 59 sec ago

SolidRun x86 Braswell MicroSoM Runs Linux and Full Windows 10, Destroys Raspberry Pi

9/22/2016 8:10pm
BetaNews has a report today about a company called SolidRun, which has announced an Intel Braswell-based MicroSoM. Unlike the ARM-powered Raspberry Pi, this is x86 compatible, meaning it can run full Windows 10. Plus, if you install a Linux distro, there will be far more packages available, such as Google Chrome, which is not available for Pi. Heck, it can probably serve as a secondary desktop, Brian with the site writes. From the report: At 53mm by 40mm, these new MicroSoMs provide unheard of design flexibility while also eliminating the headache of having to design complicated power-delivery subsystems thanks to its single power input rail design. SolidRun's Braswell MicroSoM also offers flexibility in RAM options, ranging from 1GB to 8GB configurations, and offers on-board support of eMMC storage up to 128GB. Its robust design and unsurpassed HD Edge surveillance, event detection, and statistical data-extraction capabilities makes it the platform of choice for mission-critical applications requiring guaranteed reliability," says Solidrun.It starts at $117, the website has more details on specifications.

Read more of this story at Slashdot.

TypeScript 2.0 Released

9/22/2016 7:30pm
An anonymous reader quotes a report from Ars Technica: Since its introduction, TypeScript has included new features to improve performance, enhance JavaScript compatibility, and extend the range of error checking that the TypeScript compiler performs. TypeScript 2.0 introduces a big step forward here by giving developers greater control over null values. null, used to denote (in some broad, hand-waving sense) that a variable holds no value at all, has been called the billion dollar mistake. Time and time again, programs trip up by not properly checking to see if a variable is null, and for good or ill, every mainstream programming language continues to support the null concept. TypeScript 2.0 brings a range of new features, but the biggest is control over these null values. With TypeScript 2.0, programmers can opt into a new behavior that by default prevents values from being null. With this option enabled, variables by default will be required to have a value and can't be set to null accidentally. This in turn allows the compiler to find other errors such as variables that are never initialized.

Read more of this story at Slashdot.

Taiwan Asks Google To Blur Its Military Facilities In South China Sea

9/22/2016 6:50pm
An anonymous reader quotes a report from Reuters: Taiwan's defense ministry said on Wednesday it is asking Google to blur satellite images showing what experts say appear to be new military installations on Itu Aba, Taipei's sole holding in the disputed South China Sea. The revelation of new military-related construction could raise tensions in the contested waterway, where China's building of airstrips and other facilities has worried other claimants and the United States. The images seen on Google Earth show four three-pronged structures sitting in a semi-circle just off the northwestern shoreline of Itu Aba, across from an upgraded airstrip and recently constructed port that can dock 3,000-ton frigates. "Under the pre-condition of protecting military secrets and security, we have requested Google blur images of important military facilities," Taiwan Defense Ministry spokesman Chen Chung-chi said on Wednesday, after local media published the images on Itu Aba. The United States has urged against the militarization of the South China Sea, following the rapid land reclamation by China on several disputed reefs through dredging, and building air fields and port facilities. Defense experts in Taiwan said that based on the imagery of the structures and their semi-circular layout, the structures were likely related to defense and could be part of an artillery foundation.

Read more of this story at Slashdot.

Verizon Says It Knows You Don't Need Unlimited Data

9/22/2016 6:10pm
Ed Oswald, writing for DigitalTrends: While the wireless industry is moving back to unlimited data, one carrier is not. Verizon chief financial officer Fred Shammo told attendees at the Goldman Sachs Communacopia Conference in New York on Thursday that his company doesn't think you need it, and slammed current offerings. "At the end of the day, people don't need unlimited plans," Shammo said. While this is not the first time he's said this -- in March he claimed unlimited data "doesn't work in an LTE environment," and in 2011 he helped Verizon move away from unlimited plans -- it's now an entirely different market.

Read more of this story at Slashdot.

Stephen Hawking Wants To Find Aliens Before They Find Us

9/22/2016 5:30pm
Stephen Hawking is again reminding people that perhaps shouting about our existence to aliens is not the right way to go about it, especially if those aliens are more technologically advanced. In his new half-hour program dubbed, Stephen Hawking's Favorite Places, the theoretical physicist and cosmologist said (via CNET):"If intelligent life has evolved (on Gliese 832c), we should be able to hear it," he says while hovering over the exoplanet in the animated "U.S.S. Hawking." "One day we might receive a signal from a planet like this, but we should be wary of answering back. Meeting an advanced civilization could be like Native Americans encountering Columbus. That didn't turn out so well." Hawking manages to be both worried about exposing our civilization to aliens and excited about finding them. He supports not only Breakthrough: Listen, but also Breakthrough: Starshot, another initiative that aims to send tiny nanocraft to our closest neighboring star system, which was recently found to have an Earth-like planet.

Read more of this story at Slashdot.

19-Year-Old Jailbreaks iPhone 7 In 24 Hours

9/22/2016 4:50pm
An anonymous reader writes: 19-year-old hacker qwertyoruiop, aka Luca Todesco, jailbroke the new iPhone 7 just 24 hours after he got it, in what's the first known iPhone 7 jailbreak. Todesco tweeted a screenshot of a terminal where he has "root," alongside the message: "This is a jailbroken iPhone 7." He even has video proof of the jailbreak. Motherboard reports: "He also said that he could definitely submit the vulnerabilities he found to Apple, since they fall under the newly launched bug bounty, but he hasn't decided whether to do that yet. The hacker told me that he needs to polish the exploits a bit more to make the jailbreak 'smoother,' and that he is also planning to make this jailbreak work through the Safari browser just like the famous 'jailbreakme.com,' which allowed anyone to jailbreak their iPhone 4 just by clicking on a link." Apple responded to the news by saying, "Apple strongly cautions against installing any software that hacks iOS."

Read more of this story at Slashdot.

Hacker Leaks Michelle Obama's Passport

9/22/2016 4:10pm
The hacker who leaked Colin Powell's private email account last week has struck again. This time they have hacked a low-level White House staffer and released a picture of Michelle Obama's passport, along with detailed schedules for top U.S. officials and private email messages. New York Post reports: The information has been posted online by the group DC Leaks. The White House staffer -- who also apparently does advance work for Hillary Clinton's presidential campaign -- is named Ian Mellul. The released documents include a PowerPoint outline of Vice President Joe Biden's recent Cleveland trip, showing his planned route, where he'll meet with individuals and other sensitive information, according to the Daily Mail. In an email to The Post, the hacker writes, "The leaked files show the security level of our government. If terrorists hack emails of White House Office staff and get such sensitive information we will see the fall of our country." The hacker adds, "We hope you will tell the people about this criminal negligence of White House Office staffers."

Read more of this story at Slashdot.

Elon Musk To Unveil Solar Roof With Storage, Charger Next Month

9/22/2016 3:30pm
Elon Musk plans to unveil Tesla and SolarCity's new solar roof product, which will come integrated with version 2.0 of the Tesla's PowerWall solar storage battery for the home, as well as a Tesla car charger, he said today. Bloomberg adds: Billionaire Elon Musk, the chairman and the largest shareholder of both Tesla and SolarCity Corp., announced his plans to unveil the new product in a message on Twitter Thursday. SolarCity's board agreed to Tesla's offer to buy the biggest U.S. rooftop solar supplier on Aug. 1. The product fits into his long-term vision of helping provide green homes that run on solar energy and use battery storage to help power systems, including charging electric cars, even after sundown. He announced in August that SolarCity is developing a "solar roof," a roofing product that incorporates solar technology without using standard photovoltaic panels.

Read more of this story at Slashdot.

Yahoo Confirms Massive Data Breach, 500 Million Users Impacted [Updated]

9/22/2016 2:52pm
Update: 09/22 18:47 GMT by M :Yahoo has confirmed the data breach, adding that about 500 million users are impacted. Yahoo said "a copy of certain user account information was stolen from the company's network in late 2014 by what it believes is a state-sponsored actor." As Business Insider reports, this could be the largest data breach of all time. In a blog post, the company said:Yahoo is notifying potentially affected users and has taken steps to secure their accounts. These steps include invalidating unencrypted security questions and answers so that they cannot be used to access an account and asking potentially affected users to change their passwords. Yahoo is also recommending that users who haven't changed their passwords since 2014 do so. The Intercept reporter Sam Biddle commented, "It took Yahoo two years to announce that info on half a billion user accounts was stolen." Amid its talks with Verizon for a possible acquisition -- which did happen -- Yahoo knew about the attack, but didn't inform Verizon about it, Business Insider reports. Original story, from earlier today, follows. Last month, it was reported that a hacker was selling account details of at least 200 million Yahoo users. The company's service had apparently been hacked, putting several hundred million users accounts at risk. Since then Yahoo has remained tight-lipped on the matter, but that could change very soon. Kara Swisher of Recode is reporting that Yahoo is poised to confirm that massive data breach of its service. From the report: While sources were unspecific about the extent of the incursion, since there is the likelihood of government investigations and legal action related to the breach, they noted that it is widespread and serious. Earlier this summer, Yahoo said it was investigating a data breach in which hackers claimed to have access to 200 million user accounts and was selling them online. "It's as bad as that," said one source. "Worse, really." The announcement, which is expected to come this week, also possible larger implications on the $4.8 billion sale of Yahoo's core business -- which is at the core of this hack -- to Verizon. The scale of the liability could be large and bring untold headaches to the new owners. Shareholders are likely to worry that it could lead to an adjustment in the price of the transaction.

Read more of this story at Slashdot.

Cops Are Raiding Homes of Innocent People Based Only On IP Addresses

9/22/2016 2:40pm
Kashmir Hill has a fascinating story today on what can go wrong when you solely rely on IP address in a crime investigation -- also highlighting how often police resort to IP addresses. In the story she follows a crime investigation that led police to raid a couple's house at 6am in the morning, because their IP address had been associated with the publication of child porn on notorious 4chan porn. The problem was, Hill writes: the couple -- David Robinson and Jan Bultmann -- weren't the ones who had uploaded the child porn. All they did was voluntarily use one of their old laptops as a Tor exit relay, a software used by activists, dissidents, privacy enthusiasts as well as criminals, so that people who want to stay anonymous when surfing the web could do so. Hill writes: Robinson and Bultmann had [...] specifically operated the riskiest node in the chain: the exit relay which provides the IP address ultimately associated with a user's activity. In this case, someone used Tor to make the porn post, and his or her traffic had been routed through the computer in Robinson and Bultmann's house. The couple wasn't pleased to have helped someone post child porn to the internet, but that's the thing about privacy-protective tools: They're going to be used for good and bad purposes, and to support one, you might have to support the other.Robinson added that he was a little let down because police didn't bother to look at the public list which details the IP addresses associated with Tor exit relays. Hill adds: The police asked Robinson to unlock one MacBook Air, and then seemed satisfied these weren't the criminals they were looking for and left. But months later, the case remains open with Robinson and Bultmann's names on police documents linking them to child pornography. "I haven't run an exit relay since. The police told me they'd be back if it happened again," Robinson said; he's still running a Tor node, just not the end point anymore. "I have to take the threat seriously because I don't want my wife or I to wake up with guns in our faces."Technologist Seth Schoen, and EFF Executive Director Cindy Cohn in a white paper aimed at courts and cops. "For many reasons, connecting an individual to a crime linked to an IP address, without any additional investigation, is irresponsible and threatens the civil liberties of innocent people."

Read more of this story at Slashdot.

Hackers Seed Torrent Trackers With Malware Disguised as Popular Downloads

9/22/2016 2:00pm
An anonymous reader writes: Cybercriminals are spreading malware via torrent distribution networks, using an automated tool to disguise the downloads as trending audio, video and other digital content in an attempt to infect more unsuspecting victims. Researchers at InfoArmor say they have uncovered a malicious torrent distribution network that relies on a tool called RAUM to infect computers with malware. The network begins with a torrent parser, which collects information about some of the most popular torrent files circulating around the web. Computer criminals then apply their RAUM tool to create a series of malicious files. Some are fake copies of those popular torrent files that in reality hide notorious malware such as CryptXXX, Cerber, or Dridex. Others are weaponized torrent files, while others still are parsed torrent files that rely on a high download rating, a reputation which the attackers artificially inflate by abusing compromised users' accounts to set up new seeds.

Read more of this story at Slashdot.

Charter Fights FCC's Attempt To Uncover 'Hidden' Cable Modem Fees

9/22/2016 1:20pm
Charter is trying to convince the Federal Communications Commission to backtrack on a plan that would force cable providers to charge a separate fee for cable modems, an anonymous writes, citing an ArsTechnica report. From the article: Charter is unusual compared to other cable companies in that it doesn't tack on a cable modem rental fee when offering Internet service. But FCC officials don't think that's good for consumers, because the price of Charter Internet service is the same whether a customer uses a Charter modem or buys their own. FCC Chairman Tom Wheeler's latest proposal for new cable box rules would require companies to list fees for equipment used to access video. The FCC is clearly hoping that Charter will create a separate fee for cable modems and lower the base price of Internet service by a corresponding amount, thus letting customers save money in the long run by purchasing their own modems. (Separately from modems, Charter already charges monthly fees for the use of its TV set-top boxes.) "As part of the proposal, all pay-TV providers are required to be fully transparent about the cost consumers pay for leased equipment used to access video programming," an FCC spokesperson told Ars. "The goal is to uncover hidden fees and give consumers the ability to make informed choices. If a consumer chooses to purchase their own equipment at retail, our rules would require they no long have to pay for the built-in cost on their bill. We look forward to input from the Commissioners on this aspect of the proposal."

Read more of this story at Slashdot.

Germany Unveils a Hydrogen-Powered Passenger Train

9/22/2016 12:40pm
An anonymous reader writes: The world's first CO2-emission-free train powered through hydrogen was unveiled this week in Germany. The Coradia iLint, created by French company Alstom, was presented at the Berlin InnoTrans trade show on Tuesday. The train's energy comes from combining hydrogen stored in tanks on the train with oxygen in the air. The energy is then stored in lithium-ion batteries. The train's only emissions are steam and condensed water. The train also has lower noise levels than diesel trains, emitting only the sound of its wheels on the track and any sounds from air resistance at even its highest speed of 140 kilometers per hour (about 87 miles per hour). The train has the ability to travel up to 800 kilometers (497 miles) and carry up to 300 passengers; it's the worldâ(TM)s first hydrogen passenger train that can regularly operate long journeys.

Read more of this story at Slashdot.

At Least 26 Claimed Galaxy Note 7 Fire Reports Were Untrue, Samsung Says

9/22/2016 12:00pm
Lately, a lot of behind the scene conversations have been suggesting that perhaps the Note 7 battery explosion fiasco has been blown out of the proportion. There's no evidence of any of that, so we won't discuss it any further, but amid all of this, Samsung has confirmed that at least 26 explosion reports that circulated everywhere were hoaxes. From a ZDNet report:Out of the 26 reports, the South Korean tech giant said that in 12 cases they found no fault with the devices. In seven cases, the reported victim could not be reached and in another seven incidents, the consumer cancelled the report or alleged that they threw away the device. In the US, where 1 million devices were recalled, nine such cases were reported. There were three in South Korea, two in France, and one each from the UK, Canada, Singapore, Philippines, Turkey, Vietnam, Croatia, Romania, Iraq, Lebanon, the UAE, and Czech Republic. In Korea, a worker at a convenience store alleged online that their phone exploded but Samsung said the person was currently unreachable. The user in Canada used a picture they found of the Note 7 catching fire and posed it as their own, the company said, and in Singapore, a user claimed they threw the handset out of their car when it caught fire but could not show proof.Makes you think doesn't it?

Read more of this story at Slashdot.

Microsoft Asked To Compensate After Windows 10 Update Bricked PCs

9/22/2016 11:20am
Microsoft has been asked to pay compensation to customers who suffered malfunctions on their PCs when upgrading to Windows 10. Several customers have complained in the past one year about issues such as their computer upgrading to Windows 10 without their consent, and high-data usage due to automatic downloads of Windows 10 installation files in the background. The consumer watchdog has told Microsoft to "honor consumers' rights" and compensate those who have faced issues because of Windows 10. From a report:"Many people are having issues with Windows 10 and we believe Microsoft should be doing more to fix the problem," said Alex Neill, director of policy at Which? Of 2,500 people surveyed, who had upgraded to Windows 10, more than 12 percent said they ended up rolling back to their previous version of the operating system. More than half stated that this was because the upgrade had adversely affected their PC. "We rely heavily on our computers to carry out daily activities so, when they stop working, it is frustrating and stressful," Alex Neill, Director of Campaigns and Policy, was quoted as saying.

Read more of this story at Slashdot.

Yahoo Is Expected To Confirm Massive Data Breach, Impacting Hundreds Of Millions Of Users

9/22/2016 10:40am
Last month, it was reported that a hacker was selling account details of at least 200 million Yahoo users. The company's service had apparently been hacked, putting several hundred million users accounts at risk. Since then Yahoo has remained tight-lipped on the matter, but that could change very soon. Kara Swisher of Recode is reporting that Yahoo is poised to confirm that massive data breach of its service. From the report: While sources were unspecific about the extent of the incursion, since there is the likelihood of government investigations and legal action related to the breach, they noted that it is widespread and serious. Earlier this summer, Yahoo said it was investigating a data breach in which hackers claimed to have access to 200 million user accounts and was selling them online. "It's as bad as that," said one source. "Worse, really." The announcement, which is expected to come this week, also possible larger implications on the $4.8 billion sale of Yahoo's core business -- which is at the core of this hack -- to Verizon. The scale of the liability could be large and bring untold headaches to the new owners. Shareholders are likely to worry that it could lead to an adjustment in the price of the transaction.

Read more of this story at Slashdot.

Uber's Terrifying 'Ghost Drivers' Are Freaking Out Passengers in China

9/22/2016 10:00am
Several Chinese publications are reporting that "ghost drivers" are frightening Uber passengers into paying for trips they didn't take. Passengers in Tianjin, Qingdao, Chengdu, Beijing, Shanghai and Suzhou have been canceling Uber rides after seeing creepy driver profile pictures pop up in the app. Quartz reports: Passengers using the ride-hailing app in several Chinese cities have reported seeing their requests picked up by drivers with creepy profile photos of zombie faces. According to Chinese news site Sixth Tone, the point of these ghostly profiles is to scare passengers into canceling the trip, so they are fined for a few yuan (less than a dollar), which goes to the driver. Other passengers have reported seeing their rides accepted, but then their trips were "started" by the driver on the app before they even get to the car. These "ghost rides" last less than a minute, with the driver charging customers between 8 and 15 yuan (about 1 to 2 dollars) for a ride that never happened. Calls to the drivers in these cases are never picked up, according to The Paper, a state-owned media. Passengers can however eventually be reimbursed by Uber China if they lodge a complaint.

Read more of this story at Slashdot.

Oversight Orders Reddit To Preserve Deleted Posts In Clinton Investigation

9/22/2016 9:00am
HockeyPuck writes: The House Oversight Committee has ordered Reddit to preserve deleted posts believed to be written by Paul Combetta, an IT technician the committee suspects may have deleted Hillary Clinton emails that were under subpoena. This follows up on an earlier report on reddit users' findings. Reddit users found that Combetta, through the username "StoneTear," requested help in relation to retaining and purging email messages after 60 days, and requested advice on how to remove a "VERY VIP" individual's email address from archived content. The Hill says in its report: "It's unclear what, exactly, the committee will be able to learn from the information Reddit preserves. According to the company's public policy for handling official requests, it maintains basic subscriber information, like IP logs, which identify the computer used to access a site. According to the policy, Reddit can maintain deleted records -- like a user's account -- for 90 days if it receives an official preservation order. Otherwise, the information will be subject to Reddit's 'normal retention or destruction schedules.'"

Read more of this story at Slashdot.

Scientists Discover That Horses Can Use Symbols To Talk To Us

9/22/2016 6:00am
sciencehabit writes from a report via Science Magazine: Scientists have discovered that horses can learn to use another human tool for communicating: pointing to symbols. They join a short list of other species, including some primates, dolphins, and pigeons, with this talent. Scientists taught 23 riding horses of various breeds to look at a display board with three icons, representing wearing or not wearing a blanket. Horses could choose between a "no change" symbol or symbols for "blanket on" or "blanket off." The horses did not touch the symbols randomly, but made their choices based on the weather. If it was wet, cold, and windy, they touched the blanket-on icon; horses that were already wearing a blanket nosed the "no change" image. But when the weather was sunny, the animals touched the blanket-off symbol; those that weren't blanketed pressed the "no change" icon. The study's strong results show that the horses understood the consequences of their choices, say the scientists, who hope that other researchers will use their method to ask horses more questions. The report has been published in Applied Animal Behaviour Science.

Read more of this story at Slashdot.

Appeals Court Decision Kills North Carolina Town's Gigabit Internet

9/22/2016 3:00am
MojoKid writes: In early August, the 6th Circuit U.S. Court of Appeals ruled the FCC had no authority to prevent states from imposing restrictions on municipal internet. This was a result of the FCC stepping in last year in an effort to "remove barriers to broadband investment and competition." However, the courts sided with the states, which said that the FCC's order impeded on state rights. In the end, this ruling clearly favored firmly entrenched big brand operators like Time Warner Cable, Comcast, and ATT, which lobbied hard to keep competition at bay. The federal ruling specifically barred municipal internet providers from offering service outside of their city limits, denying them from providing service to under-served communities. The fallout from the federal court's rejection of the FCC order to extend a lifeline to municipal internet providers has claimed another victim. The small community of Pinetops, North Carolina -- population 1,300 -- will soon have its gigabit internet connection shut off. Pinetops has been the recipient of Greenlight internet service, which is provided by the neighboring town of Wilson. The town of Wilson has been providing electric power to Pinetops for the past 40 years, and had already deployed fiber through the town in order to bolster its smart grid initiative. What's infuriating to the Wilson City Council and to the Pinetop residents that will lose their high-speed service is that the connections are already in place. There's no logical reason why they should be cut off, but state laws and the lobbyists supporting those laws have deemed what Greenlight is doing illegal. Provide power to a neighboring town -- sure that's OK. Provide better internet to a neighboring town -- lawsuit

Read more of this story at Slashdot.

novalug.com