posted 1 day ago on slashdot
An anonymous reader writes: Gizmodo's Annalee Newitz looked through the source code contained in the recent Ashley Madison data dump and found evidence that the company created tens of thousands of bot accounts designed to spur their male users into action by sending them messages. "The code tells the story of a company trying to weave the illusion that women on the site were plentiful and eager." The evidence suggests bots sent over 20 million messages on the website, and chatted with people over 11 million times. The vast majority of fake accounts — 70,529 to 43 — pretended to be female, and the users targeted were almost entirely men. Comments left in the code indicate some of the issues Ashley Madison's engineers had to solve: "randomizing start time so engagers don't all pop up at the same time" and "for every single state that has guest males, we want to have a chat engager." The AI was unsophisticated, though one type of bot would try to convince men to pay and then pass them to a real person.

Read More...
posted 1 day ago on slashdot
MojoKid writes: Intel is following up on its Skylake launch bonanza by opening the floodgates on at least two dozen SKUs mostly covering the mobile sector. The company is divvying up the range into four distinct series. There's the Y-Series, which is dedicated to 2-in-1 convertibles, tablets, and Intel's new Compute Stick venture. Then there's the U-Series, which is aimed at thin and light notebooks and "portable" all-in-one machines. The H-Series is built for gaming notebooks and mobile workstations, while the S-Series is designated for desktops, all-in-one machines, and mini PCs. Also, the Y-Series that was previously known as simply the Core M, (the chip found in products like the 12-inch Apple MacBook and Asus Transformer Book Chi T300) is now expanding into a whole family of processors. There will be Core m3, Core m5, and Core m7 processors, similar to Intel's Core i3, Core i5, and Core i7 CPU models in other desktop and notebook chips.

Read More...
posted 1 day ago on slashdot
An anonymous reader sends news that three employees of Vice News were arrested in Turkey because one of them used an encryption system on his personal computer. That particular type of encryption has been used by the terrorist organization known as the Islamic State, so the men were charged with "engaging in terrorist activity." The head of a local lawyers association said, "I find it ridiculous that they were taken into custody. I don't believe there is any accuracy to what they are charged for. To me, it seems like an attempt by the government to get international journalists away from the area of conflict." The Turkish government denied these claims: "This is an unpleasant incident, but the judiciary is moving forward with the investigation independently and, contrary to claims, the government has no role in the proceedings."

Read More...
posted 1 day ago on slashdot
An anonymous reader writes: The torrent-based video streaming software Popcorn Time has been in the news lately as multiple entities have initiated legal action over its use. Now, 16 Oregon-based Comcast subscribers have been targeted for their torrenting of the movie Survivor. The attorney who filed the lawsuit (PDF) says his client, Survivor Productions Inc., doesn't plan to seek any more than the minimum $750 fine, and that their goal is to "deter infringement." The lawsuit against these Popcorn Time users was accompanied by 12 other lawsuits targeting individuals who acquired copies of the movie using more typical torrenting practices.

Read More...
posted 1 day ago on slashdot
An anonymous reader writes: LLVM 3.7 was released today as the newest six-month update. LLVM 3.7 has OpenMP 3.1 support via Clang, a new On-Request Compilation JIT API, the Berkeley Packet Filter back-end was added, the AMDGPU back-end now supports OpenGL 4.1 when paired with Mesa 11.0, and many other functional changes. Early benchmarks against GCC show its performance quite competitive with GCC5, even superior in some workloads, and should be more competitive in scientific applications with there now being OpenMP support.

Read More...
posted 1 day ago on slashdot
An anonymous reader writes: Google today launched Chrome 45 for Windows, Mac, Linux, and Android with some expected changes and new developer tools. First and foremost, Chrome now automatically pauses less important Flash content (rolling out gradually, so be patient). This has been a longtime coming from both Google and Adobe, with the goal to make Flash content more power-efficient in Chrome: In March, a setting was introduced to play less Flash content on the page, but it wasn't turned on by default, and in June, the option was enabled in the browser's beta channel. Now it's being turned on for everyone.

Read More...
posted 1 day ago on slashdot
For some time, Comcast has been testing 300 GB monthly data caps in certain markets. An anonymous reader notes a policy change unveiled today that gives customers in those markets the ability to switch back to unlimited data for $30 extra. Previously (and currently, for customers who don't pay the extra $30), Comcast would charge $10 per 50GB above the cap. "Comcast's intent on this front has been clear for some time. Comcast lobbyist and VP David Cohen last year strongly suggested that usage caps would be arriving for all Comcast customers sooner or later. The idea of charging users a premium to avoid arbitrary usage restrictions has been a pipe dream of incumbent ISP executives for a decade." The new policy goes into effect on October 1.

Read More...
posted 1 day ago on slashdot
Yes, it's 3-D, and works with the Firefox browser. But that's not all. The MozVR virtual reality system is not just for Firefox, and it can incorporate infrared and other sensors to give a more complete picture than can be derived from visible light alone. In theory, the user's (client) computer needs no special hardware beyond a decent GPU and an Oculus Rift headset. Everything else lives on a server. Is this the future of consumer displays? Even if not, the development is fun to watch, which you can start doing at mozvr.com -- and if you're serious about learning about this project you may want to read our interview transcript in addition to watching the video, because the transcript contains additional information.

Read More...
posted 1 day ago on slashdot
WheezyJoe writes: ghacks and Ars Technica are providing more detail about Windows 10's telemetry and "privacy invasion" features being backported to Windows 7 and 8. The articles list and explain some of the involved updates by number (e.g., KB3068708, KB3022345, KB3075249, and KB3080149). The Ars article says the Windows firewall can block the traffic just fine, and the service sending the telemetry can be disabled. "Additionally, most or all of the traffic appears to be contingent on participating in the CEIP in the first place. If the CEIP is disabled, it appears that little or no traffic gets sent. This may not always have been the case, however; the notes that accompany the 3080149 update say that the amount of network activity when not part of CEIP has been reduced." The ghacks article explains other ways block the unwanted traffic and uninstall the updates.

Read More...
posted 1 day ago on slashdot
sciencehabit writes: Moms and sleep researchers alike have stressed the importance of solid shuteye for years, especially when it comes to fighting off the common cold. Their stance is a sensible one—skimping on sleep weakens the body's natural defense system, leaving it more vulnerable to viruses. But the connection relied largely on self-reported, subjective surveys—until now (abtract). For the first time, a team of scientists reports that they have locked down the link experimentally, showing that sleep-deprived individuals are more than four times more likely to catch a cold than those who are well-rested.

Read More...
posted 1 day ago on slashdot
BrianFagioli tips news that Mozilla, Microsoft, Google, Cisco, Intel, Amazon, and Netflix are teaming up to create the Alliance for Open Media, "an open-source project that will develop next-generation media formats, codecs and technologies in the public interest." Several of these companies have been working on this problem alone: Mozilla started Daala, Google has VP9 and VP10, and Cisco just recently announced Thor. Amazon and Netflix, of course, are major suppliers of online video streaming, so they have a vested interested in royalty-free codecs. They're inviting others to join them — the more technology and patents they get on their side, the less likely they'll run into the issues that Microsoft's VC-1 and Google's VP8 struggled with. "The Alliance will operate under W3C patent rules and release code under an Apache 2.0 license. This means all Alliance participants are waiving royalties both for the codec implementation and for any patents on the codec itself."

Read More...
posted 1 day ago on slashdot
Trailrunner7 writes: The CERT/CC is warning users that some Belkin home routers contain a number of vulnerabilities that could allow an attacker to spoof DNS responses, intercept credentials sent in cleartext, access the web management interface, and take other actions on vulnerable routers. The vulnerabilities affect the Belkin N600 DB Wireless Dual Band N+ router, model F9K1102 v2 with firmware version 2.10.17, and potentially earlier versions of the firmware, as well. The vulnerabilities have not been patched by Belkin, the advisory from the CERT/CC says there aren't any practical workarounds for them. "DNS queries originating from the Belkin N600, such as those to resolve the names of firmware update and NTP servers, use predictable TXIDs that start at 0x0002 and increase incrementally. An attacker with the ability to spoof DNS responses can cause the router to contact incorrect or malicious hosts under the attacker's control," the advisory says.

Read More...
posted 1 day ago on slashdot
New submitter danielmorrison writes: In Holland, MI (birthplace of Slashdot) we're working toward fiber to the home. A handful of people have asked why not go wireless instead? I know my reasons (speed, privacy, and we have an existing fiber loop) but are any wireless technologies good enough that cities should consider them? If so, what technologies and what cities have had success stories?

Read More...
posted 1 day ago on slashdot
Layzej writes with news carried by The Guardian about a report published by the Global Perspectives & Solutions division of Citibank (America's third-largest bank) examining the costs and benefits of a low-carbon future. The report examined two hypothetical futures: one "business as usual," and the other (the "Action" scenario) which includes an aggressive move to reduce energy use and carbon emission. From the article: "One of the most interesting findings in the report is that the investment costs for the two scenarios are almost identical. In fact, because of savings due to reduced fuel costs and increased energy efficiency, the Action scenario is actually a bit cheaper than the Inaction scenario. Coupled with the fact the total spend is similar under both action and inaction, yet the potential liabilities of inaction are enormous, it is hard to argue against a path of action." But there will be winners and losers, says the report: "The biggest loser stands to be the coal industry, where we estimate cumulative spend under our Action scenario could be $11.6 trillion less than in our Inaction scenario over the next quarter century, with renewables, wind and nuclear (as well as energy efficiency) the main beneficiaries."

Read More...
posted 2 days ago on slashdot
An anonymous reader writes: The effects of a free upgrade to Windows 10 are starting to trickle in. Available for just over a month, Windows 10 has now captured more than 5 percent market share, according to the latest figures from Net Applications. In just four weeks, Windows 10 has already been installed on over 75 million PCs. Microsoft is aiming to have 1 billion devices running Windows 10 "in two to three years," though that includes not just PCs, but smartphones, consoles, and other devices as well.

Read More...
posted 2 days ago on slashdot
An anonymous reader writes with news from The Stack that makes it a little harder to scoff at malware on phones as being largely the fruit of dodgy sideloaded software, game cracks, et cetera. They report that even phones marketed as brand new, from well-known brands like Lenovo and Xiaomi, have been tampered with and "infected prior to sale with intelligent malware disguised in popular apps such as Facebook." (To U.S. buyers, those makers may be slightly obscure as cellphone vendors; the scheme this article addresses involves handsets sold by vendors in Europe and Asia, involving more than 20 different handset types.)

Read More...
posted 2 days ago on slashdot
An anonymous reader writes: I have, for a while now, been collecting IP addresses from which email spam has been sent to, or attempted to be relayed through, my email server. I was wondering if I should publish them, so that others can adopt whatever steps are necessary to protect their email servers from that vermin. However, I am facing ethical issues here. What if the addresses are simply spoofed, and therefore branding them as spamming addresses might cause harm to innocent parties? What if, after having been co-opted by spammers, they are now used legitimately? I wonder if there's a market for all the thousands of webmail addresses that send Slashdot nothing but spam.

Read More...
posted 2 days ago on slashdot
v3rgEz writes: The 29th annual Burning Man festival kicks off this week in Nevada's Black Rock Desert. Among those paying close attention to the festivities will be the FBI's Special Events Management unit, who have kept files on "burners" since at least 2010. One of the more interesting things in those, files, however, is a lengthy, heavily redacted paragraph detailing that the FBI's Special Events Management Unit gave Las Vegas Police Department some specialized equipment for monitoring the week-long event, as long as LVPD provided follow up reports.

Read More...
posted 2 days ago on slashdot
Required Snark writes: According to Phys.org, a study by Evan Mills at Berkeley Lab shows that "gamers can achieve energy savings of more than 75 percent by changing some settings and swapping out some components, while also improving reliability and performance" because "your average gaming computer is like three refrigerators." Gaming computers represent only 2.5 percent of the global installed personal computer (PC) base but account for 20 percent of the energy use. Mills estimated that gaming computers consumed 75 TWh of electricity globally in 2012, or $10 billion, and projects that will double by 2020 given current sales rates and without efficiency improvements. Potential estimated savings of $18 billion per year globally by 2020, or 120 terawatt hours (TWh) are possible. Mills started the site GreeningtheBeast.org. You can read the full paper as a PDF.

Read More...
posted 2 days ago on slashdot
HughPickens.com writes: Brian Booker writes at Digital Journal that carbon dating suggests that the Koran, or at least portions of it, may actually be older than the prophet Muhammad himself, a finding that if confirmed could rewrite early Islamic history and shed doubt on the "heavenly" origins of the holy text. Scholars believe that a copy Koran held by the Birmingham Library was actually written sometime between 545 AD and 568, while the Prophet Mohammad was believed to have been born in 570 AD and to have died in 632 AD. It should be noted, however, that the dating was only conducted on the parchment, rather than the ink, so it is possible that the quran was simply written on old paper. Some scholars believe, however, that Muhammad did not receive the Quran from heaven, as he claimed during his lifetime, but instead collected texts and scripts that fit his political agenda. "This gives more ground to what have been peripheral views of the Koran's genesis, like that Muhammad and his early followers used a text that was already in existence and shaped it to fit their own political and theological agenda, rather than Muhammad receiving a revelation from heaven," says Keith Small, from the University of Oxford's Bodleian Library. "'It destabilises, to put it mildly, the idea that we can know anything with certainty about how the Koran emerged," says Historian Tom Holland. "and that in turn has implications for the history of Muhammad and the Companions."

Read More...
posted 2 days ago on slashdot
An anonymous reader writes: For any longtime Linux users, you probably remember the LILO bootloader from Linux distributions of many years ago. This bootloader has been in development since the 90's but development is finally ending. A homepage message reads, "I plan to finish development of LILO at 12/2015 because of some limitations (e.g. with BTFS, GPT, RAID). If someone want to develop this nice software further, please let me know ..."

Read More...
posted 2 days ago on slashdot
New submitter lvbees7 writes with news that U.S. officials have warned that the government may impose sanctions against Russia and China following cyber attacks to commercial targets. According to the Reuters story: The officials, who spoke on condition of anonymity, said no final decision had been made on imposing sanctions, which could strain relations with Russia further and, if they came soon, cast a pall over a state visit by Chinese President Xi Jinping in September. The Washington Post first reported the Obama administration was considering sanctioning Chinese targets, possibly within the next few weeks, and said that individuals and firms from other nations could also be targeted. It did not mention Russia.

Read More...
posted 2 days ago on slashdot
Zothecula writes: Developed by Yale engineer Adam Spiers, the Animotus is a wirelessly-connected, 3D printed cube that changes shape to help direct you like a haptic compass. Gizmag reports: " Spiers designed Animotus when he was involved in a performance of Flatland, an interactive play based on Edwin A. Abbott's 1884 story of a two-dimensional world. As part of the stage production, audience members – both sighted and visually impaired – were kept in complete darkness and walked four at a time though the performance space with narrative voice overs and sound effects telling the story as they wandered through. In their hands, each participant held an Animotus that guided them by changing shape to point them in the right direction. With a multi-sectioned body created in a 3D printer, that Animotus alters shape in response to wireless instructions to indicate the user’s position in their environment. To do this, the top half of the cube twists around to point users toward their next destination and then slides forward to give a relative indication of the distance to get there. As a result, rather than having to look at a device, such as the screen of a smartphone, the user was able to determine their path by touch."

Read More...
posted 2 days ago on slashdot
An anonymous reader writes: A former Secret Service agent has pleaded guilty to charges related to the theft of $800,000 worth of bitcoins during a high-profile investigation into the online drug marketplace Silk Road. Reuters reports: "Shaun Bridges, 33, appeared in federal court in San Francisco and admitted to money laundering and obstruction of justice....In court on Monday, Bridges admitted his theft made Ulbricht believe that another individual was stealing from Silk Road and helped lead Ulbricht to try to hire someone to kill that person."

Read More...
posted 2 days ago on slashdot
An anonymous reader writes: UK officials have arrested six teenagers suspected of utilizing Lizard Squad's website attack tool called "Lizzard Stresser". Lizard Squad claimed responsibility for the infamous Christmas Day Xbox Live and PlayStation Network attacks. The teenagers "are suspected of maliciously deploying Lizard Stresser, having bought the tool using alternative payment services such as Bitcoin in a bid to remain anonymous," an NCA spokesperson wrote in an official statement on the case. "Organizations believed to have been targeted by the suspects include a leading national newspaper, a school, gaming companies, and a number of online retailers."

Read More...