Facebook

Instagram Is Killing Photo Maps (mashable.com) 36

Instagram is dropping the Photo Map feature from its service. The feature allowed one to see where a person took a photo. The company began removing the feature, it confirmed to Mashable. The social networking service added that it is currently focusing on removing maps on profiles of other people, but soon you (that is, if you use the service), will lose access to your own photo map as well. The company said: Photo Map was not widely used, so we've decided to remove the feature and focus on other priorities.
Security

More Passwords, Please: 98 Million Leaked From 2012 Breach Of 'Russia's Yahoo' (arstechnica.com) 23

Sean Gallagher, writing for ArsTechnica: Another major site breach from four years ago has resurfaced. Today, LeakedSource revealed that it had received a copy of a February 2012 dump of the user database of Rambler.ru, a Russian search, news, and e-mail portal site that closely mirrors the functionality of Yahoo. The dump included usernames, passwords, and ICQ instant messaging accounts for over 98 million users. And while previous breaches uncovered by LeakedSource this year had at least some encryption of passwords, the Rambler.ru database stored user passwords in plain text -- meaning that whoever breached the database instantly had access to the e-mail accounts of all of Rambler.ru's users. The breach is the latest in a series of "mega-breaches" that LeakedSource says it is processing for release. Rambler isn't the only Russian site that has been caught storing unencrpyted passwords by hackers. In June, a hacker offered for sale the entire user database of the Russian-language social networking site VK.com (formerly VKontakte) from a breach that took place in late 2012 or early 2013; that database also included unencrypted user passwords, as ZDNet's Zach Whittaker reported.
Microsoft

Microsoft Helps Develop Smart, IoT-Enabled Refrigerators (microsoft.com) 178

An anonymous Slashdot reader writes: Promising "intelligent food management" to help with shopping and meal planning, Microsoft is collaborating with household appliance manufacturer Liebherr to develop a refrigerator where stored groceries "can be monitored using internal cameras." The refrigerators will use Microsoft's object recognition technology to create a list of your groceries -- with photos -- accessible via an an Android or iOS app (or a Windows device).

"Microsoft is providing computer vision capability as part of this collaboration," says their web page, citing the deep-learning technology underlying the Microsoft Cognitive Services Computer Vision API, released in Microsoft's open source Computational Network Toolkit. "Using the deep learning algorithms contained within CNTK, Microsoft data scientists worked with Liebherr to build a new image processing system to detect specific food products present inside a Liebherr refrigerator..."

Displays

New HDMI Mode Will Allow USB-C Connections (techhive.com) 85

An anonymous Slashdot reader quotes a report from TechHive: On Friday, HDMI Licensing announced a new cable standard that connects USB-C and HDMI devices... The idea, naturally enough, is to to develop an HDMI-to-USB Type-C cable that ties together the most common cabling protocols in both the PC and consumer electronics industries, eliminating the need for an adapter or special silicon. Source devices like PCs, tablets, and smartphones will be able to output HDMI video and multi-channel audio from a USB-C port, just as they can now with DisplayPort.

"The USB Type-C connector is gaining traction in the mobile and PC markets," said HDMI Licensing, LLC president Rob Tobias. "Consumers expect to easily connect these devices to displays with a USB Type-C to HDMI cable and utilize the capabilities and features of native HDMI. This specification will also result in more source devices incorporating HDMI," which already total about 6 billion, he said.

HDMI Licensing expects to see products launching with this new technology "early next year".
Networking

Celebrating The 19th Anniversary of Nmap (phrack.org) 26

Long-time Slashdot reader collinl writes: Nmap was released 19 years ago on September 1... Seems like it has been around for ever. Was there a port scanner before Nmap?
Good question. Nmap first appeared in an article in Phrack magazine back in 1997 (which included its complete source code), although over the years its output options have expanded to include a humorous "script kiddie" format. And by 2007 the Nmap Scripting Engine was released, which in 2010 was used to generate a cool visualization showing the popularity of the top million favicons.
Social Networks

Facebook Removes Fake Article About Megyn Kelly From Trending Topics (theverge.com) 116

Less than a week after Facebook announced that it is changing the way it handles the Trending Topics section on the social networking website, a fake article about Fox News anchor Megyn Kelly was found trending on Facebook. The article, headlined "Breaking: Fox News Exposes Traitor Megyn Kelly, Kicks Her Out for Backing Hillary" comes from a conspiracy theory website, which has more than 200,000 likes on Facebook. Its Megyn Kelly story was the topic of discussion for many across the world. The article is obviously fake. The other cited source for this trending topic was an outlet called "Conservating101"
Businesses

How G.E. Is Transforming Into An IoT Start-Up (nytimes.com) 115

Slashdot reader mspohr shares an article about "General Electric 're-inventing' itself as a software start-up." Jeffrey R. Immelt, the CEO of America's largest manufacturer, describes how he realized that data collected from their machines -- like turbines, engines, and medical-imaging equipment -- could be as valuable as the machines themselves. Now G.E. is hiring software engineers and data scientists from Amazon, Apple, Facebook and Google to try to transform the company into a "124-year-old startup" to take advantage of the Internet of Things and offer futuristic new services like predictive maintenance.

The Times calls it "the next battlefield as companies fight to develop the dominant software layer that connects the machines," adding that by 2020 there will be 100 times as much data flowing from G.E.'s machines. Now G.E. Digital is using the open source PaaS, Cloud Foundry, to develop Predix, a cloud-based operating system for industrial applications like monitoring and adjusting equipment in the field, whether it's an oil-field rig or a wind-farm turbine. To help transform the company into a digital powerhouse, they're building a 1,400-employee complex in San Ramon, California "designed to suit the free-range working ways of software developers: open-plan floors, bench seating, whiteboards, couches for impromptu meetings, balconies overlooking the grounds and kitchen areas with snacks." And they've also launched the Industrial Dojo program "to accelerate the ability for developers to contribute code that enables the Industrial Internet".
Google

Google Fiber To Cut Staff In Half After User Totals Disappoint, Says Report (dslreports.com) 204

An anonymous reader quotes a report from DSLReports: Sources claim that Google Fiber has been disappointed with the company's overall number of total subscribers since launching five years ago. A paywalled report over at The Information cites a variety of anonymous current and former Google employees, who say the estimated 200,000 or so broadband subscribers the company had managed to sign up by the end of 2014 was a fary cry from the company's original projection of somewhere closer to 5 million. Google Fiber has never revealed its total number of subscribers. A report last October pegged the company's total broadband subscribers at somewhere around 120,000, though it's unclear how many of those users had signed up for Google Fiber's symmetrical 5 Mbps tier, which was originally free after users paid a $300 installation fee. Disappointed by sluggish subscriber tallies, The Information report states that last month Alphabet CEO Larry Page ordered Google Fiber boss Craig Barratt to cut the total Google Fiber staff in half to roughly 500 people. That's a claim that's sure to only fuel continued speculation that the company is starting to get cold feet about its attempts to bring broadband competition to a broken duopoly market.
Businesses

Canon Unveils EOS 5D Mark IV DSLR (canonrumors.com) 160

It's been a little more than 4 year since Canon unveiled the EOS 5D Mark III. Today, Canon took the wraps off its successor -- the EOS 5D Mark IV. The Mark IV features a 34-megapixel, full-frame CMOS sensor and Digic 6+ processor with support for capturing 4K video at 23.98, 24, 25 and 30 fps. In addition, it features a 61-point autofocus system, built-in digital lens optimizer, NFC, Wi-Fi and an ISO range of 100-32,000. The continuous shooting mode is set at 7 fps, compared to 6 fps on the 5D Mark III. It will also take both CompactFlash and SD cards, and there is GPS included in the body for geotagging images. Canon is selling the Mark IV in early September for $3,499 for the body only. They're also selling two new L-series EF lenses -- the Canon EF 16-35mm f/2.8L III USM Ultra-Wide Zoom Lens and EF 24-105mm f/4L IS II USM Standard Zoom Lens. President and COO, Canon U.S.A., Inc, Yichi Ishizuka said in a statement: "Canon's EOS 5D series of DSLR cameras has a history of being at the forefront of still and video innovation. And today, we add to this family of cameras the EOS 5D Mark IV -- the first in our 5D series to offer 4K video and built-in Wi-Fi and NFC connectivity. In developing this new DSLR camera, we listened to the requests of current EOS users to create for them a modern, versatile camera designed to help them create and share beautiful still and video imagery." Here's a blast from the past: Canon's EOS 1Ds Mark II. Slashdot reader LoudMusic submitted this story back in 2004, highlighting the camera's "802.11a/g and wired networking capabilities."
The Internet

Singapore To Cut Off Public Servants From the Internet (theguardian.com) 59

Singapore is planning to cut off web access for public servants as a defence against potential cyber attack, Reuters reports. The local government's move has already been criticized by many, who say that it marks a retreat for a technologically advanced city-state that has trademarked the term "smart nation". From an article on The Guardian: Some security experts say the policy, due to be in place by May, risks damaging productivity among civil servants and those working at more than four dozen statutory boards, and cutting them off from the people they serve. It may only raise slightly the defensive walls against cyber attack, they say. Ben Desjardins, director of security solutions at network security firm Radware, called it "one of the more extreme measures I can recall by a large public organisation to combat cyber security risks." Stephen Dane, a Hong Kong-based managing director at networking company Cisco Systems, said it was "a most unusual situation" and Ramki Thurimella, chair of the computer science department at the University of Denver, called it both "unprecedented" and "a little excessive".
Canada

Ashley Madison Security Protocols Violated Canada, Austrialia Privacy Laws (www.cbc.ca) 29

The Office of the Privacy Commissioner of Canada said Tuesday that the Canada-based online dating and social networking service Ashely Madison used inadequate privacy and security technology while marketing itself as a discreet and secure way for consenting adults to have affairs. CBC.ca reports: "In a report Tuesday, the privacy watchdog says the Toronto-based company violated numerous privacy laws in Canada and abroad in the era before a massive data breach exposed confidential information from their clients to hackers. The hack stole correspondence, identifying details and even credit card information from millions of the site's users. The resulting scandal cost the company about a quarter of its annual revenues from irate customers who demanded refunds and cancelled their accounts. Working with a similar agency in Australia, the privacy group says the company knew that its security protocols were lacking but didn't do enough to guard against being hacked. The company even adorned its website with the logo of a 'trusted security award' -- a claim the company admits it fabricated." The report found that "poor habits such as inadequate authentication processes and sub-par key and password management practices were rampant at the company" and that "much of the company's efforts to monitor its own security were 'focused on detecting system performance issues and unusual employee requests for decryption of sensitive user data.'" What's more is that Ashley Madison continued to store personal information of its users even after some of which had deleted or deactivated their account(s). These people then had their information included in databases published online after the hack.
Cellphones

IPv6 Achieves 50% Reach On Major US Carriers (worldipv6launch.org) 150

Long-time Slashdot reader dyork brings new from The Internet Society: IPv6 deployment hit a milestone this month related to the four major US providers (Verizon Wireless, T-Mobile USA, Sprint, AT&T): "IPv6 is the dominant protocol for traffic from those mobile networks to major IPv6-capable content providers."
A graph on their "World IPv6 Launch" site shows those carriers are now delivering close to 55% of their traffic over IPv6 to major IPv6-capable content providers -- up from just 37.59% in December. "This is really remarkable progress in the four years since World IPv6 Launch in 2012, and the growth of IPv6 deployment in 2016 is showing no signs of abating." In fact, the NTIA is now requesting feedback from organizations that have already implemented IPv6, noting that while we've used up all the 4.3 billion IPv4 addresses, IPv6 offers 340 undecillion IP addresses -- that is, 340 followed by 36 digits.
Businesses

Cisco Systems To Lay Off About 14,000 Employees, Representing 20% of Global Workforce (crn.com) 239

schwit1 writes from a report via CRN: Cisco Systems is laying off about 14,000 employees, representing nearly 20 percent of the network equipment maker's global workforce. San Jose, California-based Cisco is expected to announce the cuts within the next few weeks, the report said, as the company transitions from its hardware roots into a software-centric organization. Cisco increasingly requires "different skill sets" for the "software-defined future" than it did in the past, as it pushes to capture a higher share of the addressable market and aims to boost its margins, the CRN report said citing a source familiar with the situation. "The company's headcount as of April 20, 2016, was 73,104," reports CRN. "Cutting 14,000 employees would be the single largest layoff in Cisco's 32-year history."

UPDATE 8/17/16: Cisco has reported its fourth-quarter 2016 earnings and they have exceeded analysts' expectations.
Google

Malware That Fakes Bank Login Screens Found In Google Ads (fastcompany.com) 120

tedlistens quotes a report from Fast Company: For years, security firms have warned of keystroke logging malware that surreptitiously steals usernames and passwords on desktop and laptop computers. In the past year, a similar threat has begun to emerge on mobile devices: So-called overlay malware that impersonates login pages from popular apps and websites as users launch the apps, enticing them to enter their credentials to banking, social networking, and other services, which are then sent on to attackers. Such malware has even found its way onto Google's AdSense network, according to a report on Monday from Kaspersky Lab. The weapon would automatically download when users visited certain Russian news sites, without requiring users to click on the malicious advertisements. It then prompts users for administrative rights, which makes it harder for antivirus software or the user to remove it, and proceeds to steal credentials through fake login screens, and by intercepting, deleting, and sending text messages. The Kaspersky researchers call it "a gratuitous act of violence against Android users." "By simply viewing their favorite news sites over their morning coffee users can end up downloading last-browser-update.apk, a banking Trojan detected by Kaspersky Lab solutions as Trojan-Banker.AndroidOS.Svpeng.q," according to the company. "There you are, minding your own business, reading the news and BOOM! -- no additional clicks or following links required." The good news is that the issue has since been resolved, according to a Google spokeswoman. Fast Company provides more details about these types of attacks and how to stay safe in its report.
AI

Has The NSF Automated Coding with ExCAPE? (adtmag.com) 140

The National Science Foundation is developing a way to create working code using "automated program synthesis," a new technology called ExCAPE "that provides human operators with automated assistance.... By removing the need for would-be programmers to learn esoteric programming languages, the method has the potential to significantly expand the number of people engaged in programming in a variety of disciplines, from personalized education to robotics." Rajeev Alur, who leads a team of researchers from America's nine top computer science programs, says that currently software development "remains a tedious and error-prone activity." Slashdot reader the_insult_dog writes: While its lofty goals of broadly remaking the art of programming might not be realized, the research has already made some advances and resulted in several tools already in use in areas such as commercial software production and education...
For example, the NSF created a new tool (which they've recently patented) called NetEgg, which generates code for controlling software-defined networks, as well as Automata Tutor and AutoProf, which provide automated feedback to computer science students.
Classic Games (Games)

Hacked Hobbit Pinball Machine Joins IoT, Broadcasts Itself Over Twitch (lachniet.com) 45

Random web surfers could send a text message or even upload an image to be displayed on the back glass of Mark Lachniet's pinball machine, according to Mael517, while the machine itself webcast footage of both its playing field and backglass using Twitch. Interestingly, all the extra functionality was coded directly into the machine, according to Lachniet, who added only the webcam and an ethernet cord. The Hobbit [machine] has a whole bunch of hardware that I don't really understand and can barely fix... However, it has a computer in its guts, and this I can mostly understand.
After identifying the pinball machine's motherboard, CPU, operating system (Ubuntu) and an SQL database, Lachniet was able to backup its software, and then create his own modifications. He envisions more possibilities -- for example, the ability to announce high scores on social media accounts or allow remote servicing of the machine. Lachniet even sees the possibility of a world-wide registry of pinball game scores with each player's location overlaid on Google Maps "so you could view pinball hot spots and where the high scores were coming from," and maybe even networking machines together to allow real-time global competition."
Networking

The Rise and Fall of the Gopher Protocol (minnpost.com) 225

An anonymous reader writes: Tim Gihring at MinnPost talks to the creators of what was, briefly, the biggest thing in the internet, Gopher. Gopher, for those who don't know or have forgotten, was the original linked internet application, allowing you to change pages and servers easily, though a hierarchical menu system. It was quick, it was easy to use, and important for this day and age, it didn't have Flash.
The article remembers Tim Berners-Lee describing the idea of a worldwide web at a mid-March, 1992 meeting of the Internet Engineering Task Force, at a time when Gopher "was like the Web but more straightforward, and it was already working." Gopher became magnitudes more popular -- both MTV and the White House announced Gopher sites -- leading to GopherCons around the country. Just curious -- how many Slashdot readers today remember using Gopher?
Botnet

LinkedIn Suffers Huge Bot Attack That Steals Members' Personal Data (siliconbeat.com) 109

An anonymous reader quotes a report from SiliconBeat: Data thieves used a massive "botnet" against professional networking site LinkedIn and stole member's personal information, a new lawsuit reveals. "LinkedIn members populate their profiles with a wide range of information concerning their professional lives, including summaries (narratives about themselves), job histories, skills, interests, educational background, professional awards, photographs and other information," said the company's complaint, filed in Northern California U.S. District Court (PDF). "During periods of time since December 2015, and to this day, unknown persons and/or entities employing various automated software programs (often referred to as 'bots') have extracted and copied data from many LinkedIn pages." It is unclear to what extent LinkedIn has been able to stymie the attack. A statement from the firm's legal team suggests one avenue of penetration has been permanently closed, but does not address other means of incursion listed in the lawsuit. "Their actions have violated the trust that LinkedIn members place in the company to protect their information," the complaint said. "LinkedIn will suffer ongoing and irreparable harm to its consumer goodwill and trust, which LinkedIn has worked hard for years to earn and maintain, if the conduct continues." LinkedIn says it has more than 128 million U.S. members and more than 400 million worldwide. According to the complaint, the hackers got around six LinkedIn cybersecurity systems, and also manipulated a cloud-services company that was on the company's "whitelist" of "popular and reputable service providers, search engines and other platforms" which interact with LinkedIn under less severe security measures than other third parties. The manipulation allowed the hackers to send requests to LinkedIn servers. "This was not an attack or data breach where confidential data was stolen," LinkedIn's legal team said in a statement. "This suit is about unknown entities using automated systems to scrape and copy data that members have made available on LinkedIn, violating the law and our Terms of Service."
Bitcoin

DDoSCoin: New Crypto-Currency Rewards Users For Participating In DDoS Attacks (softpedia.com) 45

An anonymous reader writes from a report via Softpedia: "In the most innovative, weirdest, and stupidest idea of the month, two researchers from the University of Colorado Boulder and the University of Michigan have created a crypto-currency that rewards people for participating in DDoS attacks," reports Softpedia. "Called DDoSCoin, this digital currency rewards a person (the miner) for using their computer as part of a DDoS attack. Just like Bitcoin, DDoSCoin uses cryptographic data to provide a proof-of-work. In DDoSCoin's case, this proof-of-work is extracted from the TLS connection a miner establishes with the website they're supposed to attack." This means that DDoSCoin can be used only with DDoS attacks on TLS-enabled websites. Participating in DDoS attacks gives miners DDoSCoin, which can then be converted in Bitcoin or fiat currency. Furthermore, anyone can request a DDoS attack via the PAY_TO_DDOS transaction. The research paper that proposes DDoSCoin is only a theoretical exercise, and a DDoSCoin crypto-currency does not currently exist in the real world. For now.
Advertising

Facebook Rolls Out Code To Nullify Adblock Plus' Workaround (techcrunch.com) 426

An anonymous reader writes: The Wall Street Journal issued a report Tuesday that said Facebook will begin forcing ads to appear for all users of its desktop site, even if they use ad-blocking software. Adblock Plus, the most popular ad-blocking software, opposed Facebook's plan and found a workaround to Facebook's revision two days later. Now, TechCrunch is reporting that Facebook is well aware of Adblock Plus' workaround and their "plan to address the issue" is coming quick. "A source close to Facebook tells [TechCrunch] that today possibly within hours, the company will push an update to its site's code that will nullify Adblock Plus' workaround," reports TechCrunch. "Apparently it took two days for Adblock Plus to come up with the workaround, and only a fraction of that time for Facebook to disable it." An update on their site says, "A source says Facebook is now rolling out the code update that will disable Adblock Plus' workaround. It should reach all users soon."

Slashdot Top Deals