DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×
Security

Antivirus Webroot Deletes Windows Files, Causes Serious Problems For Users (pcworld.com) 34

Users of Webroot's endpoint security product, consumers and businesses alike, had a nasty surprise Monday when the program started flagging Windows files as malicious. From a report: The reports quickly popped up on Twitter and continued on the Webroot community forum -- 14 pages and counting. The company came up with a manual fix to address the issue, but many users still had problems recovering their affected systems. The problem is what's known in the antivirus industry as a "false positive" -- a case where a clean file is flagged as malicious and is blocked or deleted. False positive incidents can range in impact from merely annoying -- for example, when a program cannot run anymore -- to crippling, where the OS itself is affected and no longer boots. The Webroot incident falls somewhere in the middle because it affected legitimate Windows files and sent them to quarantine. This is somewhat unusual because antivirus firms typically build whitelists of OS files specifically to prevent false positive detections.
Social Networks

Some of the Biggest Economies Aren't a Big User Of Social Media (axios.com) 74

From a report: Only 37 percent of Germans use social media, according to a new Pew survey, a surprising figure given the fact that Germany is the world's fourth-largest economy by GDP, according to the World Economic Forum. Similar patterns follow for Japan, France and Italy, ranked 3rd, 6th and 8th in largest economy by GDP.
Security

Companies Are Paying Millions For White Hat Hacking (nypost.com) 54

White hat hackers "are in very high demand," says PwC's director of cyber investigation and breach response, in a New York Post article titled "Companies are paying millions to get hacked -- on purpose." An anonymous reader quotes their report: HackerOne, a San Francisco-based "vulnerability coordination and bug bounty platform," reports that it has some 800 corporate customers who paid out more than $15 million in bonuses to white-hat hackers since its founding in 2012. Most of that bounty was paid in the past two years, as companies have become more aware of their cyber vulnerabilities. Clients that have used the platform include General Motors, Uber, Twitter, Starbucks and even the US Department of Defense.
Google paid $3 million last year through its own bounty program, according to HackerOne's CEO Marten Micko, who touts his company's "turn-key" solution -- a platform which now offers the services of 100,000 ethical (and vetted) hackers. "With a diverse group, all types of vulnerabilities can be found," Micko told TechRepublic. "This is a corollary to the 'given enough eyeballs' wisdom... they find them faster than other solutions, the hunting is ongoing and not happening at just one time, and the cost is a tenth of what it would be with other methods." And one of the platform's white hat hackers has already earned over $600,000 in just two years.
The Internet

America's Most-Hated ISP Is Now Hated By Fewer People (oregonlive.com) 97

"Comcast's customer service may actually be improving," writes an Oregon newspaper. An anonymous reader quotes their report: In the second year of Comcast's broad customer service overhaul, complaints to Oregon cable regulators are down 25%. They've also declined 40% since 2014. Complaints are falling nationally, too, according to the highly regarded American Customer Satisfaction Index. Its most recent report showed a surge in Comcast subscriber satisfaction... Two years ago, Comcast made Oregon the test bed for its customer service push, responding both to disparaging headlines and the prospect of growing competition from other telecom companies and from streaming video services.

The company is adding Apple-style retail stores around the metro area and introduced innovations to help consumers understand what they're paying for and when technicians will arrive for service calls. It's rolling out new tools nationally to help them improve their home Wi-Fi, and diagnosing problems before customers call to complain... For example, if several subscribers in the same neighborhood use the company's tool for testing internet speeds, that triggers an alert at Comcast to look for a problem in the local network. The company redesigned its bills to make it clearer what customers subscribe to, and what it costs, in hopes of reducing confusion and calls. And Comcast has a robust social media presence, fielding complaints on Twitter.

The article points out that Comcast's satisfaction scores are still below-average for cable TV providers, "and well below the median among internet service providers. And that's a low bar -- the telecom sector is among the most complained about under ACSI's rankings." Their figures show that the only ISPs in America with a lower score for customer satisfaction are Cox Communications, Time Warner Cable, and MediaCom.
United Kingdom

Britain Set For First Coal-Free Day Since Industrial Revolution (theguardian.com) 206

An anonymous reader quotes a report from The Guardian: The UK is set to have its first ever working day without coal power generation since the Industrial Revolution, according to the National Grid. The control room tweeted the predicted milestone on Friday, adding that it is also set to be the first 24-hour coal-free period in Britain. The UK has had shorter coal-free periods in 2016, as gas and renewables such as wind and solar play an increasing role in the power mix. The longest continuous period until now was 19 hours -- first achieved on a weekend last May, and matched on Thursday. Hannah Martin, head of energy at Greenpeace UK, said: "The first day without coal in Britain since the Industrial Revolution marks a watershed in the energy transition. A decade ago, a day without coal would have been unimaginable, and in 10 years' time our energy system will have radically transformed again." Britain became the first country to use coal for electricity when Thomas Edison opened the Holborn Viaduct power station in London in 1882. It was reported in the Observer at the time that "a hundred weight of coal properly used will yield 50 horse power for an hour." And that each horse power "will supply at least a light equivalent to 150 candles."
Microsoft

LinkedIn Apologizes For Trying To Connect Everyone In Real Life (vocativ.com) 71

LinkedIn has apologized for a vague new update that told some iPhone users its app would begin sharing their data with nearby users without further explanation. From a report: The update prompted outrage on Twitter after cybersecurity expert Rik Ferguson received a strange alert when he opened the resume app to read a new message: "LinkedIn would like to make data available to nearby Bluetooth devices even when you're not using the app." That gave Ferguson, vice president of research at the cybersecurity firm Trend Micro, a handful of concerns, he told Vocativ. Among them: "the lack of specificity, which data, when, under what conditions, to which devices, why does it need to happen when I'm not using the app, what are the benefits to me, where is the feature announcement and explanation, why wasn't it listed in the app update details." Reached for comment, LinkedIn said it's a mistake -- that some iPhone users were accidentally subject to undeveloped test feature the company is still working on.
Red Hat Software

Red Hat Suffers Massive Data Center Network Outage 85

An anonymous reader writes: According to multiple reports on Twitter, the Fedora Infrastructure Status page, and the #fedora-admin Freenode IRC channel, Red Hat is suffering a massive network outage at their primary data center. Details are sketchy at this point, but it looks to be impacting the Red Hat Customer Portal; as well as all their repositories (including Fedora, EPEL, Copr); their public build system, Koji; and a whole host of other popular services. There is no ETA for restoration of services at this point.
China

China To Question Apple About Live-Streaming Apps On App Store That Violate Internet Regulations (theguardian.com) 31

Three Chinese government agencies are planning to tell Apple to "tighten up checks" on live-streaming software offered on its app store, which can be used to violate internet regulation in the country. "Law enforcement officers had already met with Apple representatives over live-streaming services, [state news agency Xinhua reported], but did not provide details of the meetings," reports The Guardian. From the report: The inquiry appears to be focused on third-party apps available for download through Apple's online marketplace. The company did not respond to requests for comment. China operates the world's largest internet censorship regime, blocking a host of foreign websites including Google, Facebook, Twitter and Instagram, but the authorities have struggled to control an explosion in popularity of live-streaming video apps. As part of the inquiry into live-streaming, three Chinese websites -- toutiao.com, huoshanzhibo.com and huajiao.com -- were already found to have violated internet regulations, and had broadcast content that violated Chinese law, including providing "pornographic content," the Xinhua report said. Pornography is banned in China. The three sites were told to increase oversight of live-broadcasting services, user registration and "the handling of tips-offs." Two of the websites, huoshanzhibo.com and huajiao.com, were under formal investigation and may have their cases transferred to the police for criminal prosecutions, the Xinhua report said. Casting a wide net, the regulations state that apps cannot "engage in activities prohibited by laws and regulations such as endangering national security, disrupting social order and violating the legitimate rights and interests of others."
Android

Samsung Blocks Ability To Remap Galaxy S8's Bixby Button (zdnet.com) 119

A Samsung representative confirmed today via Twitter that the company has blocked the ability for users to remap the Bixby hardware button on the Galaxy S8. For soon-to-be Galaxy S8 owners, the news will come as a disappointment, especially since the Bixby voice assistant in English has been delayed and will not be fully functional when units starting shipping later this week. ZDNet reports: XDA Developers first reported a Galaxy S8 firmware update blocked the ability to remap the button to perform a variety of tasks. Before, the button could even be remapped to launch Google Assistant. It's not clear if Samsung will ever support remapping the button. A representative for Samsung tweeted: "Can't say it will never happen, but we won't officially support."
AI

Russia Wants To Send A Gun-Shooting Robot To The ISS (mashable.com) 141

"Just in time for the rise in global military tensions, Russian officials have released video that's sure to calm fears all around: a death dealing humanoid robot that shoots handguns." An anonymous reader quotes Mashable: Posted to Twitter on Friday by Russia's deputy Prime Minister, Dmitry Rogozin, the video shows the country's space robot FEDOR (Final Experimental Demonstration Object Research) accurately shooting twin pistols in a scene chillingly similar to images from The Terminator. But rather than being displayed as a not-so-subtle warning to the entire human population of the planet, Rogozin instead claims via Facebook that it's just a demonstration of the robot's dexterity and use of algorithms to execute tasks.
CNET quotes Russia's deputy prime minister as saying "We are not creating a Terminator, but artificial intelligence that will be of great practical significance in a lot of spheres." Russia plans to deploy the robot on the International Space Station by 2021, Mashable reports, adding "Hopefully, the robot's arrival on the ISS will come sans life-snuffing weaponry, which is pretty much the opposite of the intent behind creating a peaceful international space station shared by the world's super powers in the first place."
The Military

North Korea Parades Hybrid 'Frankenmissile', Then Fails Yet Another Missile Launch Test (cnn.com) 296

First, an anonymous reader quotes Inverse: On Saturday, the North Korean military paraded an unprecedented array of weapons through Kim Il-sung Square in the center of Pyongyang... "We're totally floored right now," Dave Schmerler of the Middlebury Institute of International Studies in Monterey, California, tells the Wall Street Journal. "I was not expecting to see this many new missile designs." Schmerler tells The Journal that the large missiles -- the "frankenmissiles," as he calls them -- in the parade appear to be hybrids of the North Korean KN-08 and KN-14 missiles, both of which are ICBMs.
But at least one arms control expert noted that while the parade included ICBM-sized canisters, "what's inside is anyone's guess" -- and there's still mixed results for the country's missile program. "An attempted missile launch by North Korea on Sunday failed, US and South Korean defense officials told CNN... At this point, US military officials don't believe the missile had intercontinental capabilities, a US defense official told CNN." The official said there was limited data -- because the missile blew up so quickly -- prompting CNN.com to run the story under the headline "Show of Strength a Flop."

Update: Slashdot reader Dan Drollette is a science writer/editor and foreign correspondent for Bulletin of the Atomic Scientists, and contacted us earlier today to share his recently-published analysis "to delve into what has been happening lately...and to discredit some common tropes in the media, such as the idea that 'North Korea is about to collapse,' 'China has a lot of influence over North Korea,' 'North Korea can credibly threaten the United States right now,' 'North Korea has no reason to feel threatened,' or 'The North can be completely denuclearized.'"
Government

GOP Congressman Defending Privacy Vote: 'Nobody's Got To Use The Internet' (washingtonpost.com) 305

Wisconsin congressman F. James Sensenbrenner Jr. defended his decision to help repeal broadband privacy rules by telling a constituent, "Nobody's got to use the Internet." An anonymous reader quotes the 73-year-old congressman: "And the thing is that if you start regulating the Internet like a utility, if we did that right at the beginning, we would have no Internet... Internet companies have invested an awful lot of money in having almost universal service now. The fact is is that, you know, I don't think it's my job to tell you that you cannot get advertising for your information being sold. My job, I think, is to tell you that you have the opportunity to do it, and then you take it upon yourself to make that choice... That's what the law has been, and I think we ought to have more choices rather than fewer choices with the government controlling our everyday lives."
"The congressman then moved on to the next question," reports The Washington Post, but criticism of his remarks appeared on social media. One activist complained that the congressman's position was don't use the internet if you don't want your information sold to advertisers -- drawing a clarification from the congressman's office.

"Actually he said that nobody has to use the Internet. They have a choice. Big difference."
Programming

'Pragmatic Programmer' Author Andy Hunt Loves Arduino, Hates JavaScript (bestprogrammingbooks.com) 181

Andy Hunt is one of the 17 software developers who wrote the Agile Manifesto, and he co-authored The Pragmatic Programmer. Now Slashdot reader cerberusss writes: In an interview with Best Programming Books, Andy Hunt mentions he "hates languages that introduce accidental complexity, such as JavaScript -- what a nightmare of pitfalls for newbies and even seasoned developers... My go-to languages are still Ruby for most things, or straight C for systems programming, Pi or Arduino projects." Furthermore, he mentions that "I tend to do more experimenting and engineering than pure code writing, so there's occasionally some soldering involved ;). Code is just one tool of many."
Andy writes that he also likes Elixir, talks about Agile, reveals how he survived his most challenging project, and says the biggest advancement in programming has been the open source movement. ("Imagine trying to study chemistry, but the first half of the elements were patent-protected by a major pharma company and you couldn't use them...") And he also answered an interesting follow-up question on Twitter: "Do you feel validated in an age of Node and GitHub? Some of your best chapters (scripting and source control) are SOP now!"

Andy's reply? "We've made some great progress, for sure. But there's much to be done still. E.g., You can't ship process."
Facebook

Facebook Targets 30,000 Fake France Accounts Before Election (go.com) 112

An anonymous reader quotes a report from ABC News: Facebook says it has targeted 30,000 fake accounts linked to France ahead of the country's presidential election, as part of a worldwide effort against misinformation. The company said Thursday it's trying to "reduce the spread of material generated through inauthentic activity, including spam, misinformation, or other deceptive content that is often shared by creators of fake accounts." It said its efforts "enabled us to take action" against the French accounts and that it is removing sites with the highest traffic. Facebook and French media are also running fact-checking programs in France to combat misleading information, especially around the campaign for the two-round April 23-May 7 presidential election. European authorities have also pressured Facebook and Twitter to remove extremist propaganda or other postings that violate European hate speech or other laws.
Advertising

Burger King Won't Take a Hint; Alters TV Ad To Evade Google's Block (washingtonpost.com) 606

ewhac writes: Earlier this week, Burger King released a broadcast television ad that opened with an actor saying, "Ok, Google, what is the Whopper?" thereby triggering any Google Home device in hearing range to respond to the injected request with the first line from the Whopper's Wikipedia page. Google very properly responded to the injection attack by fingerprinting the sound sample and blocking it from triggering responses. However, it seems Burger King and/or its ad agency are either unwilling or congenitally incapable of getting the hint, and has released an altered version of the ad to evade Google's block. According to spokesperson Dara Schopp, BK regards the ad as a success, as it has increased the brand's "social conversation" on Twitter by some 300%. It seems that Burger King thinks that malware-laden advertising infesting webpages is a perfectly wonderful idea (in principle, at least), and has taken it to the next level by reaching through your TV speakers and directly messing with your digital devices. You may wish to consider alternate vendors for your burger needs.
Security

NSA-Leaking Shadow Brokers Just Dumped Its Most Damaging Release Yet (arstechnica.com) 111

An anonymous reader quotes a report from Ars Technica: The Shadow Brokers -- the mysterious person or group that over the past eight months has leaked a gigabyte worth of the National Security Agency's weaponized software exploits -- just published its most significant release yet. Friday's dump contains potent exploits and hacking tools that target most versions of Microsoft Windows and evidence of sophisticated hacks on the SWIFT banking system of several banks across the world. Friday's release -- which came as much of the computing world was planning a long weekend to observe the Easter holiday -- contains close to 300 megabytes of materials the leakers said were stolen from the NSA. The contents (a convenient overview is here) included compiled binaries for exploits that targeted vulnerabilities in a long line of Windows operating systems, including Windows 8 and Windows 2012. It also included a framework dubbed Fuzzbunch, a tool that resembles the Metasploit hacking framework that loads the binaries into targeted networks. Independent security experts who reviewed the contents said it was without question the most damaging Shadow Brokers release to date. One of the Windows zero-days flagged by Hickey is dubbed Eternalblue. It exploits a remote code-execution bug in the latest version of Windows 2008 R2 using the server message block and NetBT protocols. Another hacking tool known as Eternalromance contains an easy-to-use interface and "slick" code. Hickey said it exploits Windows systems over TCP ports 445 and 139. The exact cause of the bug is still being identified. Friday's release contains several tools with the word "eternal" in their name that exploit previously unknown flaws in Windows desktops and servers.
Japan

The Great Japan Potato-Chip Crisis: Panic Buying, $12 Bags (bloomberg.com) 110

Demand for potato chips has surged in Japan this week, with products on offer for 6 times their retail price online after Japanese snack company Calbee halted the sale of some of its most popular chip brands. From a report: Calbee's pizza-flavored chips were going for about 1,250 yen ($12) on Yahoo Japan Corp.'s auction website Friday. One bag usually sells for less than 200 yen. Photos of near-empty shelves at their local supermarkets were trending on Twitter. The crunch came after Calbee warned on Monday that it will temporarily halt the sale of 15 types of potato chips due to a bad crop in Hokkaido, a key potato-producing region. The northern island was hit by a record number of typhoons last year. Calbee, which has a market value of 507.9 billion yen and is 20 percent-owned by PepsiCo Inc., has a 73 percent market share of potato chips. Potato chips are a big deal in Japan, a country also known for its senbei rice crackers and Pocky sticks. Calbee's potato-snack products were the most and second-most popular snacks in a TV Asahi poll of 10,000 people and 13 confectionery makers last year, and the subject of a primetime show that lasted more than two hours.
Transportation

Tesla Will Reveal Its Electric Semi Truck in September (techcrunch.com) 273

From a report: Elon Musk just let us know when we'll get a look at the electric semi truck that he's teased in the past: The Tesla transport vehicle will be revealed in September, the CEO said on Twitter on Thursday, noting that the team has "done an amazing job" and that the vehicle is "seriously next level." Plans at Tesla for an electric semi truck have been in the works for a while now: The vehicle was first mentioned back in July of 2016, when Musk revealed part 2 of his fabled "master plan" for his electric vehicle company. The Tesla Semi, as Musk called it, is designed to help reduce the cost of cargo transportation, and improve safety for drivers, according to the CEO at the time.
Cellphones

Scientists Prove Your Phone's PIN Can Be Stolen Using Its Gyroscope Data (digitaltrends.com) 61

A team of scientists at Newcastle University in the UK managed to reveal a user's phone PIN code using its gyroscope data. "In one test, the team cracked a passcode with 70 percent accuracy," reports Digital Trends. "By the fifth attempt, the accuracy had gone up to 100 percent." From the report: It takes a lot of data, to be sure. The Guardian notes users had to type 50 known PINs five times before the researchers' algorithm learned how they held a phone when typing each particular number. But it highlights the danger of malicious apps that gain access to a device's sensors without requesting permission. The risk extends beyond PIN codes. In total, the team identified 25 different smartphone sensors which could expose compromising user information. Worse still, only a small number -- such as the camera and GPS -- ask the user's permission before granting access to that data. It's precise enough to track behavior. Using an "orientation" and "emotion trace" data, the researchers were able to determine what part of a web page a user was clicking on and what they were typing. The paper has been published in International Journal of Information Security.
Twitter

Twitter Allegedly Deleting Negative Tweets About United Airlines' Passenger Abuse (thenextweb.com) 233

New submitter dooode writes: As you would have read, United just had another Nazi moment where they had to "re-accommodate" a customer using some (not so gentle) force. The social web seems to have been taken by a storm by this incident. But suddenly people are noticing their tweets are being deleted -- some of them merely status questions. Does twitter make money (read bribes) to delete negative tweets? What do you feel about it? The Next Web adds that "some of the allegedly deleted tweets did not directly mention the incident with the forcibly removed passenger." On the flip side, "some of the initial tweets exposing United Airlines' abusive treatment of passengers are still very much present and actively being reshared on the platform." It's possible that the "allegedly deleted tweets" initially appeared as replies to now-deleted tweets, but TNW says they contacted several users who rejected that premise, "claiming the missing posts were standard tweets."

Slashdot Top Deals