Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

  • How the World's Fastest Electric Car Is Pushing Wireless Charging Tech

    An anonymous reader writes With the first ever season of Formula E revving up in China next month, it's clear there's more to electric cars than Tesla. But the race cars hitting the track in Beijing don't have anything on the speed of Drayson Racing Technology's Lola B12 69/EV, which holds the record for the world's fastest lightweight electric car, and which uses the kind of power technologies that could one day have applications off the track too—like charging your phone wirelessly.

    45 comments | yesterday

  • FBI Investigates 'Sophisticated' Cyber Attack On JP Morgan, 4 More US Banks

    Bruce66423 writes with news of an electronic attack believed to affect at least five U.S. banking institutions this month, including JP Morgan, now being investigated by the FBI. According to the Independent, The attack on JP Morgan reportedly resulted in the loss of “gigabytes of sensitive data” that could have involved customer and employee information. It is said to have been of a level of sophistication beyond ordinary criminals, leading to speculation of a state link. The FBI is thought to be investigating whether there is a connection to Russia. American-Russian relations continue to be fraught amid the crisis in Ukraine, with sanctions ramped up. Bruce66423 asks "The quality of the attack, which appears to have led to 'gigabytes' of data being lost, is raising the prospect of a state being the source. The present culprit suggested is Russia... why the assumption it's not China — just because China isn't invading the Ukraine at the moment?" News of the attack is also at the New York Times, which notes Earlier this year, iSight Partners, a security firm in Dallas that provides intelligence on online threats, warned companies that they should be prepared for cyberattacks from Russia in retaliation for Western economic sanctions. But Adam Meyers, the head of threat intelligence at CrowdStrike, a security firm that works with banks, said that it would be “premature” to suggest the attacks were motivated by sanctions.

    97 comments | 2 days ago

  • Net Neutrality Is 'Marxist,' According To a Koch-Backed Astroturf Group

    Jason Koebler (3528235) writes American Commitment, a conservative group with strong ties to the Koch brothers has been bombarding inboxes with emails filled with disinformation and fearmongering in an attempt to start a "grassroots" campaign to kill net neutrality — at one point suggesting that "Marxists" think that preserving net neutrality is a good idea. American Commitment president Phil Kerpen suggests that reclassifying the internet as a public utility is the "first step in the fight to destroy American capitalism altogether" and says that the FCC is plotting a "federal Internet takeover," a move that "sounds more like a story coming out of China or Russia."

    521 comments | 3 days ago

  • A New Homegrown OS For China Could Arrive By October

    According to a Reuters report, China could have a new homegrown operating system by October to take on imported rivals such as Microsoft Corp, Google Inc and Apple Inc, Xinhua news agency said on Sunday. Computer technology became an area of tension between China and the United States after a number of run-ins over cyber security. China is now looking to help its domestic industry catch up with imported systems such as Microsoft's Windows and Google's mobile operating system Android. The operating system would first appear on desktop devices and later extend to smartphone and other mobile devices, Xinhua said, citing Ni Guangnan who heads an official OS development alliance established in March. It would make sense for even a "homegrown" operating system to be based on existing ones, in the way Red Flag Linux is. Conceptually related: Earlier this year, Chinese company Coship Electronics announced (and demonstrated) a mobile OS called 960 OS.

    93 comments | 5 days ago

  • Researchers Made a Fake Social Network To Infiltrate China's Internet Censors

    Jason Koebler writes: In order to get inside China's notorious internet filter, Harvard researcher Gary King created his own fake social network to gain access to the programs used to censor content, so he could reverse-engineer the system. "From inside China, we created our own social media website, purchased a URL, rented server space, contracted with one of the most popular software platforms in China used to create these sites, submitted, automatically reviewed, posted, and censored our own submissions," King wrote in a study published in Science. "We had complete access to the software; we were even able to get their recommendations on how to conduct censorship on our own site in compliance with government standards."

    49 comments | about a week ago

  • Dramatic Shifts In Manufacturing Costs Are Driving Companies To US, Mexico

    hackingbear writes: According to a new Cost-Competitiveness Index, the nations often perceived as having low manufacturing costs — such as China, Brazil, Russia, and the Czech Republic — are no longer much cheaper than the U.S. In some cases, they are estimated to be even more expensive. Chinese manufacturing wages have nearly quintupled since 2004, while Mexican wages have risen by less than 50 percent in U.S. dollar terms, contrary to our long-standing misconception that their labors were being slaved. In the same period, the U.S. wage is essentially flat, whereas Mexican wages have risen only 67%. Not all countries are taking full advantage of their low-cost advantages, however. The report found that global competiveness in manufacturing is undermined in nations such as India and Indonesia by several factors, including logistics, the overall ease of doing business, and inflexible labor markets.

    233 comments | about a week ago

  • Interviews: Andrew "bunnie" Huang Answers Your Questions

    A while ago you had a chance to ask Andrew "bunnie" Huang about hardware, hacking and his open source hardware laptop Novena. Below you'll find his answers to those questions.

    32 comments | about a week ago

  • China Pulls Plug On Genetically Modified Rice and Corn

    sciencehabit writes China's Ministry of Agriculture has decided not to renew biosafety certificates that allowed research groups to grow genetically modified (GM) rice and corn. The permits, to grow two varieties of GM rice and one transgenic corn strain, expired on 17 August. The reasoning behind the move is not clear, and it has raised questions about the future of related research in China.

    152 comments | about a week ago

  • Scientists Baffled By Unknown Source of Ozone-Depleting Chemical

    schwit1 writes: Scientists have found that, despite a complete ban since 2007, ozone-depleting chemicals are still being pumped into the atmosphere from some unknown source. "Carbon tetrachloride (CCl4), which was once used in applications such as dry cleaning and as a fire-extinguishing agent, was regulated in 1987 under the Montreal Protocol along with other chlorofluorocarbons that destroy ozone and contribute to the ozone hole over Antarctica. Parties to the Montreal Protocol reported zero new CCl4 emissions between 2007-2012. However, the new research shows worldwide emissions of CCl4 average 39 kilotons (about 43,000 U.S. tons) per year, approximately 30 percent of peak emissions prior to the international treaty going into effect. "We are not supposed to be seeing this at all," said Qing Liang, an atmospheric scientist at NASA's Goddard Space Flight Center in Greenbelt, Maryland, and lead author of the study published online in the Aug. 18 issue of Geophysical Research Letters, a journal of the American Geophysical Union. "It is now apparent there are either unidentified industrial leakages, large emissions from contaminated sites, or unknown CCl4 sources."

    303 comments | about two weeks ago

  • Why Chinese Hackers Would Want US Hospital Patient Data

    itwbennett (1594911) writes In a follow-up to yesterday's story about the Chinese hackers who stole hospital data of 4.5 million patients, IDG News Service's Martyn Williams set out to learn why the data, which didn't include credit card information, was so valuable. The answer is depressingly simple: people without health insurance can potentially get treatment by using medical data of one of the hacking victims. John Halamka, chief information officer of the Beth Israel Deaconess Medical Center and chairman of the New England Healthcare Exchange Network, said a medical record can be worth between $50 and $250 to the right customer — many times more than the amount typically paid for a credit card number, or the cents paid for a user name and password. "If I am one of the 50 million Americans who are uninsured ... and I need a million-dollar heart transplant, for $250 I can get a complete medical record including insurance company details," he said.

    171 comments | about two weeks ago

  • Hackers Steal Data Of 4.5 Million US Hospital Patients

    itwbennett (1594911) writes Community Health Systems said the attack occurred in April and June of this year, but it wasn't until July that it determined the theft had taken place. Working with a computer security company, it determined the attack was carried out by a group based in China that used 'highly sophisticated malware' to attack its systems. The hackers got away with patient names, addresses, birthdates, telephone numbers and Social Security numbers of the 4.5 million people who were referred to or received services from doctors affiliated with the company in the last five years. The stolen data did not include patient credit card, medical, or clinical information.

    111 comments | about two weeks ago

  • Knocking Down the Great Firewall of China

    New submitter Nocturrne writes: The FOSS project Lantern is having great success in unblocking the internet for many users in oppressive regimes, like China and Iran. Much like Tor and BitTorrent, Lantern is using peer-to-peer networking to overcome firewalls, but with the additional security of a trusted network of friends. "If you download Lantern in an uncensored region, you can connect with someone in a censored region, who can then access whatever content they want through you. What makes the system so unique is that it operates on the basis of trust. ... Through a process called consistent routing, the amount of information any single Lantern user can learn about other users is limited to a small subset, making infiltration significantly more difficult." The network of peers is growing, but we need more friends in uncensored countries to join us.

    167 comments | about two weeks ago

  • Apple Begins Storing Chinese User Data On Servers In China

    An anonymous reader writes Reuters reported on Friday that Apple "has begun keeping the personal data of some Chinese users on servers in mainland China." Apple has claimed that the move is meant "to improve the speed and reliability of its iCloud service", but given China's track record with censorship and privacy, the explanation rings hollow for some skeptics. Nevertheless, Apple assures its Chinese users that their personal data on China Telecom is encrypted and that the encryption keys will be stored offshore. Only time will tell if Apple will be able to resist Chinese government requests to access its China-based servers.

    92 comments | about two weeks ago

  • Not Just For ThinkPads Anymore: Lenovo Gets OK To Buy IBM Server Line

    IBM sold its personal computer line (including the iconic ThinkPad line) to Lenovo back in 2005. Now, Lenovo is poised to acquire IBM's line of X86-based servers, and has garnered the approval of a regulatory body which could have scotched the deal. (The article describes the server line at issue as "low end," but that's in the eye of the beholder.) From the article: The conclusion of the review by the Committee on Foreign Investment in the U.S., or Cfius, is “good news for both IBM and Lenovo, and for our customers and employees,” Armonk, New York-based IBM said yesterday in a statement. While Cfius placed some conditions on the deal, they don’t significantly affect the business, and terms of the transaction didn’t change as result, a person with knowledge of the matter said, without specifying the conditions. The sale drew scrutiny because of disputes between China and the U.S., the world’s two largest economies, over cyberintrusions. By completing the deal, IBM can jettison a less profitable business to focus on growing areas, such as cloud computing and data analytics, while giving Lenovo a bigger piece of the global computing-hardware market. ... Spokesmen for IBM and Lenovo declined to comment on whether the Cfius clearance included any requirements or concessions. Holly Shulman, a spokeswoman for the Treasury Department, which leads Cfius, declined to comment.

    93 comments | about two weeks ago

  • A Look At Advanced Targeted Attacks Through the Lens of a Human-Rights NGO

    An anonymous reader writes New research was released on cyber-attacks via human-rights NGO World Uyghur Congress over a period of four years. Academic analysis was conducted through the lens of a human-rights NGO representing a minority living in China and in exile when most targeted attack reports are against large organizations with apparent or actual financial or IP theft unlike WUC, and reported by commercial entities rather than academics. The attacks were a combination of sophisticated social engineering via email written primarily in the Uyghur language, in some cases through compromised WUC email accounts, and with advanced malware embedded in attached documents. Suspicious emails were sent to more than 700 different email addresses, including WUC leaders as well as journalists, politicians, academics and employees of other NGOs (including Amnesty International and Save Tibet — International Campaign for Tibet). The study will be presented at USENIX on August 21, and the full paper is already available.

    25 comments | about two weeks ago

  • Reversible Type-C USB Connector Ready For Production

    orasio writes: One of the most frustrating first-world problems ever (trying to connect an upside-down Micro-USB connector) could disappear soon. The Type-C connector for USB has been declared ready for production by the USB Promoter Group (PDF). "With the Type-C spec finalized, it now comes down to the USB-IF to actually implement the sockets, plugs, cables, adapters, and devices. The problem is that there are billions of existing USB devices and cables that will need adapters and new cables to work with new Type-C devices. It’s a lot like when Apple released the Lightning connector, but on an even grander scale. Further exacerbating the issue is the fact that China, the EU, and the GSMA have all agreed that new mobile devices use Micro-USB for charging — though it might be as simple as including a Micro-USB-to-Type-C adapter with every new smartphone."

    191 comments | about two weeks ago

  • Chinese Researchers' 'Terror Cam' Could Scan Crowds, Looking for Stress

    concertina226 (2447056) writes Scientists at China's Southwest University in Chongqing are working on a new type of camera that takes Big Brother to a whole new level – the camera is meant to detect highly stressed individuals so that police can catch them before they commit a crime. The camera makes use of hyperspectral imaging, i.e. a 'stress sensor' that measures the amount of oxygen in blood across visible areas of the body, such as the face. Chinese authorities are deeply concerned about the recent spate of deadly attacks occurring in public places, such as the mass stabbing attack by eight knife-wielding extremists in the city of Kunming, Yunnan in March, which left 29 civilians dead and over 140 others injured.

    146 comments | about two weeks ago

  • Injecting Liquid Metal Into Blood Vessels Could Help Kill Tumors

    KentuckyFC (1144503) writes One of the most interesting emerging treatments for certain types of cancer aims to starve the tumor to death. The strategy involves destroying or blocking the blood vessels that supply a tumor with oxygen and nutrients. Without its lifeblood, the unwanted growth shrivels up and dies. This can be done by physically blocking the vessels with blood clots, gels, balloons, glue, nanoparticles and so on. However, these techniques have never been entirely successful because the blockages can be washed away by the blood flow and the materials do not always fill blood vessels entirely, allowing blood to flow round them. Now Chinese researchers say they've solved the problem by filling blood vessels with an indium-gallium alloy that is liquid at body temperature. They've tested the idea in the lab on mice and rabbits. Their experiments show that the alloy is relatively benign but really does fill the vessels, blocks the blood flow entirely and starves the surrounding tissue of oxygen and nutrients. The team has also identified some problems such as the possibility of blobs of metal being washed into the heart and lungs. Nevertheless, they say their approach is a promising injectable tumor treatment.

    111 comments | about three weeks ago

  • Google Is Backing a New $300 Million High-Speed Internet Trans-Pacific Cable

    An anonymous reader writes Google has announced it is backing plans to build and operate a new high-speed internet Trans-Pacific cable system called "FASTER." In addition to Google, the $300 million project will be jointly managed by China Mobile International, China Telecom Global, Global Transit, KDDI, and SingTel, with NEC as the system supplier. FASTER will feature the latest high-quality 6-fiber-pair cable and optical transmission technologies. The initial design capacity is expected to be 60Tb/s (100Gb/s x 100 wavelengths x 6 fiber-pairs), connecting the US with two locations in Japan.

    135 comments | about three weeks ago

  • China Smartphone Maker Xiaomi Apologizes For Unauthorized Data Access

    SpzToid writes Following up an earlier story here on Slashdot, now Xiaomi has apologized for collecting private data from its customers. From the article: "Xiaomi Inc said it had upgraded its operating system to ensure users knew it was collecting data from their address books after a report by a computer security firm said the Chinese budget smartphone maker was taking personal data without permission. The privately held company said it had fixed a loophole in its cloud messaging system that had triggered the unauthorized data transfer and that the operating system upgrade had been rolled out on Sunday. The issue was highlighted last week in a blog post by security firm F-Secure Oyg. In a lengthy blogpost on Google Plus, Xiaomi Vice President Hugo Barra apologized for the unauthorized data collection and said the company only collects phone numbers in users' address books to see if the users are online."

    64 comments | about three weeks ago

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>