Compare cell phone plans using Wirefly's innovative plan comparison tool ×
Microsoft

Microsoft Apps Will Be Pre-loaded On Lenovo and Motorola Android Devices (betanews.com) 71

An anonymous reader writes: There was a time when Microsoft was seen as the enemy of Linux and Apple communities. Understandably, at the time, the company only wanted Windows to succeed. Nowadays, however, the operating system is sort of inconsequential. Microsoft seems happy to have its software succeed on 'competitor' platforms such as iOS, Android, macOS, Ubuntu and more. Today, Microsoft announces that it has partnered with Lenovo on a new mobile initiative. The Windows-maker's productivity apps will be pre-loaded on Lenovo and Motorola-branded devices running Google's Linux-based Android operating system.As of earlier this year, Microsoft had over 74 Android OEM partners. As for submitter's take on this, it's pretty simple. Microsoft is going where users are. If they are not going to purchase Windows Phones, Microsoft will go to Android and iOS.
Businesses

Bill Gates's Net Worth Hits $90 Billion (bloomberg.com) 154

schwit1 quotes a report from Bloomberg: The net worth of the world's richest person Bill Gates hit $90 billion on Friday, fueled by gains in public holdings including Canadian National Railway Company and Ecolab Inc. Gates's fortune is now $13.5 billion bigger than that of the world's second-wealthiest person, Spanish retail mogul Amancio Ortega, according to the Bloomberg Billionaires Index. At $90 billion, the Microsoft Corp. co-founder's net worth is equal to 0.5 percent of U.S. GDP. Less than two weeks ago, Bill Gates topped Forbes' "100 Richest Tech Billionaires In The World 2016" (Warning: may be paywalled) list with an estimated fortune of $78 billion.
NES (Games)

Aluminum NES Maker Announces Smaller, Cheaper Analogue Nt Mini (polygon.com) 67

An anonymous reader quotes a report from Polygon: Analogue, the company behind the aluminum NES known as the Analogue Nt, is releasing a smaller, less expensive version of its console this January. Known as the Analogue Nt mini, the new version of the long-sold out hardware will be 20 percent smaller and carry a lower price: $449. The original Analogue Nt was priced at $499, but its tinier successor will outclass the original model with a better offering, the company says. The mini will comes with RGB and HDMI output (1080p/720p/480p) built in. The console will include a wireless 8Bitdo NES30 controller and Retro Receiver -- compatible with PlayStation 4, PlayStation 3, Wii and Wii U Pro Controllers -- as part of the package. In addition, the Nt mini will support over 2,000 NES, Famicom and Famicom Disk System games.
AT&T

AT&T Says LTE Can Still Offer Speeds Up To 1 Gbps (dslreports.com) 49

An anonymous reader writes from a report via DSL Reports: ATT CTO Andre Fuetsch said at a telecom conference last week that the company's existing LTE network should be able to reach speeds of 1 Gbps before the standard ultimately gets overshadowed by faster 5G tech. The new 5G technology isn't expected to arrive until 2020 at the earliest, so LTE has a lot of time left as the predominant wireless connectivity. "There's a lot of focus on 5G -- but don't discount LTE," Fuetsch said. "LTE is still here. And LTE will be around for a long time. And LTE has also enormous potential in that, you'll be capable of supporting 1 gigabit speeds as well." 5G will help move past 1 Gbps speeds, while also providing significantly lower latency. "You'll see us sharing more about the trial activity we're doing," said Fuetsch. "Everything that's being [tested] right now is not standard, it's all sort of proprietary. But this is an important process to go through because this is how you learn and how it helps define standards."
Operating Systems

Linux Turns 25, Is Bigger and More Professional Than Ever (arstechnica.com) 256

The Linux operating system kernel is 25 years old this month, ArsTechnica writes. It was August 25, 1991 when Linus Torvalds posted his famous message announcing the project, claiming that Linux was "just a hobby, won't be big and professional like gnu." From the article: But now, Linux is far bigger and more professional than Torvalds could have imagined. Linux powers huge portions of the Internet's infrastructure, corporate data centers, websites, stock exchanges, the world's most widely used smartphone operating system, and nearly all of the world's fastest supercomputers. The successes easily outweigh Linux's failure to unseat Microsoft and Apple on PCs, but Linux has still managed to get on tens of millions of desktops and laptops and Linux software even runs on Windows.Do you use any Linux-based operating system? Share your experience with it. What changes would you want to see in it in the next five years?
Businesses

Interviews: Ask Raspberry Pi Founder and CEO Eben Upton a Question 124

It's been roughly five years since we last interviewed the founder and CEO of Raspberry Pi (Trading) Ltd., Eben Upton. Eben currently serves as a technical director and ASIC architect for Broadcom. He founded the Raspberry Pi Foundation in 2009 to develop and market a $25 microcomputer for education. He has also founded two successful mobile games and middleware companies, Ideaworks 3d Ltd. and Podfun Ltd., and served a Director of Studies for computer science at St. John's College, Cambridge. Ebon has agreed to take some time out of his busy schedule and answer some of your questions.

You may ask Eben as many questions as you'd like, but please, one per comment. We'll pick the very best questions and forward them to Eben Upton himself. (Feel free to leave your suggestions for who Slashdot should interview next.)

Go on, don't be shy!
Android

Google Begins Rolling Out Android 7.0 Nougat (venturebeat.com) 153

An anonymous reader writes: Google today started rolling out Android 7.0 Nougat to existing Nexus devices via an over-the-air software update. This is a gradual rollout: The Nexus 6, Nexus 5X, Nexus 6P, Nexus 9, Nexus Player, Pixel C, and General Mobile 4G (Android One) will all be updated, but " it may take several weeks" before everyone gets the latest and greatest, a Google spokesperson told VentureBeat.The Nexus 5 (2013), which packs in a Snapdragon 800 SoC coupled with 2GB of RAM and 5-inch full-HD display, won't be receiving Android Nougat update -- despite having all the hardware capabilities required for a phone to receive Google's latest OS update. The truth of the matter is if Google wanted to update the Nexus 5 with the latest Android software, it could have. It just chose not to. It's very likely that same will be the case for the Nexus 6, a phone that has 3GB of RAM, and Snapdragon 805 SoC, next year when the company releases Android O update.
Government

Group Wants To Shut Down Tor For a Day On September 1 (softpedia.com) 217

An anonymous reader writes: An internal group at the Tor Project is calling for a full 24-hour shutdown of the Tor network to protest the way the Tor Project dealt with the Jake Applebaum sexual misconduct accusations, and because of recent rumors it might be letting former government agents in its ranks. Two Tor members, also node operators, have shut down their servers as well, because of the same reason. They explained their motivations here and here.
"The protesters have made 16 demands," according to the article, six related to related to supposed infiltration of Tor by government agents, and 10 regarding the Appelbaum ruling and investigation -- including "asking all Tor employees that participated in this investigation to leave" and "the persons behind the JacobAppelbaum.net and the @JakeMustDie and @VictimsOfJake Twitter accounts to come forward and their identities made public."
Debian

Systemd Rolls Out Its Own Mount Tool (phoronix.com) 515

An anonymous Slashdot reader writes: I'm surprised this hasn't surfaced on Slashdot already, but yesterday Phoronix reported that systemd will soon be handling file system mounts, along with all the other stuff that systemd has encompassed. The report generated the usual systemd arguments over on Reddit.com/r/linux with Lennart Poettering, systemd developer and architect, chiming in with a few clarifications.
Lennart argued it will greatly improve the handling of removable media like USB sticks.
Security

Software Exploits Aren't Needed To Hack Most Organizations (darkreading.com) 56

The five most common ways of hacking an organization all involve stolen credentials, "based on data from 75 organizations, 100 penetration tests, and 450 real-world attacks," writes an anonymous Slashdot reader. In fact, 66% of the researchers' successful attacks involved cracking a weak domain user password. From an article on Dark Reading: Playing whack-a-mole with software vulnerabilities should not be top of security pros' priority list because exploiting software doesn't even rank among the top five plays in the attacker's playbook, according to a new report from Praetorian. Organizations would be far better served by improving credential management and network segmentation...

"If we assume that 1 percent [of users] will click on the [malicious] link, what will we do next?" says Joshua Abraham, practice manager at Praetorian. The report suggests specific mitigation tactics organizations should take in response to each one of these attacks -- tactics that may not stop attackers from stealing credentials, but "building in the defenses so it's really not a big deal if they do"... [O]ne stolen password should not give an attacker (or pen tester) the leverage to access an organization's entire computing environment, exfiltrating all documents along the way.

Similar results were reported in Verizon's 2016 Data Breach Investigations Report.
Security

German Minister Wants Facial Recognition Software At Airports and Train Stations (www.rte.ie) 110

An anonymous Slashdot reader quotes a surprising report from Ireland's National Public Service Broadcaster (based on a report in the German newspaper Bild am Sonntag): Germany's Interior Minister wants to introduce facial recognition software at train stations and airports to help identify terror suspects following two Islamist attacks in the country last month... "Then, if a suspect appears and is recognised, it will show up in the system," he told the paper. He said a similar system was already being tested for unattended luggage, which the camera reports after a certain number of minutes. The article reports that other countries are also considering the technology.
Security

Computer Science Professor Mocks The NSA's Buggy Code (softpedia.com) 176

After performing hours of analysis, a computer science professor says he's "not impressed" by the quality of the recently-leaked code that's supposedly from an NSA hacking tool. An anonymous Slashdot reader writes: The professor, who teaches Software Vulnerability Analysis and Advanced Computer Security at the University of Illinois, Chicago, gripes about the cryptography operations employed in the code of an exploit called BANANAGLEE, used against Fortinet firewalls. Some of his criticism include the words "ridiculous", "very bad", "crazy" and "boring memory leaks".

"I would expect relatively bug-free code. And I would expect minimal cryptographic competence. None of those were true of the code I examined which was quite surprising," the professor told Softpedia in an email.

If these were cyberweapons, "I'm pretty underwhelmed by their quality," professor Checkoway writes on his blog, adding that he found "sloppy and buggy code," no authentication of the encrypted communication channel, 128-bit keys generated using 64 bits of entropy, and cypher initialization vectors that leaked bits of the hash of the plain text...
Windows

Microsoft Has Broken Millions Of Webcams With Windows 10 Anniversary Update (thurrott.com) 214

The Anniversary Update which Microsoft rolled out to Windows 10 users earlier this month has broken millions of webcams, the company said on Friday. The problem is that after installing the update, the company added, Windows no longer allows USB webcams to use MJPEG or H264 encoding processes, and only supports YUY2 encoding. Microsoft says it introduced the changes to prevent an issue that was resulting in duplication of encoding the stream (poor performance). If you're facing the issue, there's a workaround (via Thurrott.com): Rafael has figured out a workaround that should hopefully stop the freezing issue; if you are comfortable tweaking the registry, make this change. HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows Media Foundation\Platform, add DWORD "EnableFrameServerMode" and set to 0
Government

The NSA Leak Is Real, Snowden Documents Confirm (theintercept.com) 143

Sam Biddle, reporting for The Intercept: On Monday, A hacking group calling itself the "ShadowBrokers" announced an auction for what it claimed were "cyber weapons" made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect computers worldwide. The provenance of the code has been a matter of heated debate this week among cybersecurity experts, and while it remains unclear how the software leaked, one thing is now beyond speculation: The malware is covered with the NSA's virtual fingerprints and clearly originates from the agency. The evidence that ties the ShadowBrokers dump to the NSA comes in an agency manual for implanting malware, classified top secret, provided by Snowden, and not previously available to the public. The draft manual instructs NSA operators to track their use of one malware program using a specific 16-character string, "ace02468bdf13579." That exact same string appears throughout the ShadowBrokers leak in code associated with the same program, SECONDDATE. SECONDDATE plays a specialized role inside a complex global system built by the U.S. government to infect and monitor what one document estimated to be millions of computers around the world. Its release by ShadowBrokers, alongside dozens of other malicious tools, marks the first time any full copies of the NSA's offensive software have been available to the public, providing a glimpse at how an elaborate system outlined in the Snowden documents looks when deployed in the real world, as well as concrete evidence that NSA hackers don't always have the last word when it comes to computer exploitation.
Businesses

Malware Infected All Eddie Bauer Stores In US, Canada (krebsonsecurity.com) 50

New submitter alir1272 quotes a report from Krebs On Security: Clothing store chain Eddie Bauer said today it has detected and removed malicious software from point-of-sale systems at all of its 350+ stores in North America, and that credit and debit cards used at those stores during the first six months of 2016 may have been compromised in the breach. The acknowledgement comes nearly six weeks after Krebs On Security first notified the clothier about a possible intrusion at stores nationwide. "The company emphasized that this breach did not impact purchases made at the company's online store eddiebauer.com," reports Krebs On Security.
AI

RealDoll CEO Aims To Make Its Sex Dolls Love You Back Via AI App (mirror.co.uk) 199

An anonymous reader quotes a report from Mirror.co.uk: Matt McMullen, CEO of RealDoll, revealed the next step in making the high-end sex toys will be to give them artificial intelligence to replicate humans more closely than ever. "We are building an AI system which can either be connected to a robotic doll OR experienced in a VR environment," he revealed as part of an AMA (ask me anything) on Reddit. "I think it will allow for an option that never existed before, and for some, may represent a happiness they [users] never thought they could have. We are designing the AI to be fun and engaging, more than focusing on whether it can fool you into thinking it's a person," he said. He later added, when someone asked if dolls will ever love us back: "I hope that we can at least simulate that," McMullen responded. "That's the goal." In addition to AI and VR, Teledildonics are coming to the sex industry as well. "Teledildonics is technology for remote sex where tactile sensations are communicated over a data link between the participants -- with Siri, Alexa, Cortana and other AI software," reports Mirror.co.uk. The company is "putting the finishing touches" on its AI app, with plans to release it within the next six months. Oh, and it's also working on releasing a RealDoll with a robotic head by the end of 2017 to celebrate its 20th anniversary.
Security

Millions Of Steam Game Keys Stolen After Hacker Breaches Gaming Site (zdnet.com) 68

An anonymous reader writes:A little over nine million keys used to redeem and activate games on the Steam platform were stolen by a hacker who breached a gaming news site last month. The site, DLH.net, provides news, reviews, cheat codes, and forums, was breached on July 31 by an unnamed hacker, whose name isn't known but was also responsible for the Dota 2 forum breach. The site also allows users to share redeemable game keys through its forums, which along with the main site has around 3.3 million unique registered users, according to breach notification site LeakedSource.com, which obtained a copy of the database. A known vulnerability found in older vBulletin forum software, which powers the site's community, allowed the hacker to access the databases. The data stolen from the forum includes full names, usernames, scrambled passwords, email addresses, dates of birth, join dates, avatars, Steam usernames, and user activity data. Facebook access tokens were stolen for those who signed in with their social account.
Open Source

Microsoft PowerShell Goes Open Source and Lands On Linux and Mac (pcworld.com) 396

Microsoft announced on Thursday that it is open sourcing PowerShell, its system administration, scripting, and configuration management tool that has been a default part of Windows for several years. The company says it will soon release PowerShell on Mac and Linux platforms. PCWorld reports: The company is also releasing alpha versions of PowerShell for Linux (specifically Ubuntu, Centos and Redhat) and Mac OS X. A new PowerShell GitHub page gives people the ability to download binaries of the software, as well as access to the app's source code. PowerShell on Linux and Mac will let people who have already built proficiency with Microsoft's scripting language take those skills and bring them to new platforms. Meanwhile, people who are used to working on those platforms will have access to a new and very powerful tool for getting work done. It's part of Microsoft's ongoing moves to open up products that the company has previously kept locked to platforms that it owned. The company's open sourcing of its .NET programming frameworks in 2014 paved the way for this launch, by making the building blocks of PowerShell available on Linux and OS X. By making PowerShell available on Linux, Microsoft has taken the skills of Windows administrators who are already used to the software, and made them more marketable. It has also made it possible for hardcore Linux users to get access to an additional set of tools that they can use to manage a variety of systems.
Security

People Ignore Software Security Warnings Up To 90% of the Time, Says Study (phys.org) 124

An anonymous reader quotes a report from Phys.Org: A new study from BYU, in collaboration with Google Chrome engineers, finds the status quo of warning messages appearing haphazardly -- while people are typing, watching a video, uploading files, etc. -- results in up to 90 percent of users disregarding them. Researchers found these times are less effective because of "dual task interference," a neural limitation where even simple tasks can't be simultaneously performed without significant performance loss. Or, in human terms, multitasking. For example, 74 percent of people in the study ignored security messages that popped up while they were on the way to close a web page window. Another 79 percent ignored the messages if they were watching a video. And a whopping 87 percent disregarded the messages while they were transferring information, in this case, a confirmation code. For example, Jenkins, Vance and BYU colleagues Bonnie Anderson and Brock Kirwan found that people pay the most attention to security messages when they pop up in lower dual task times such as: after watching a video, waiting for a page to load, or after interacting with a website. For part of the study, researchers had participants complete computer tasks while an fMRI scanner measured their brain activity. The experiment showed neural activity was substantially reduced when security messages interrupted a task, as compared to when a user responded to the security message itself. The BYU researchers used the functional MRI data as they collaborated with a team of Google Chrome security engineers to identify better times to display security messages during the browsing experience.
Nintendo

Nintendo Shuts Down 'Pokemon Uranium' Fan Game After 1.5 Million Downloads (thewrap.com) 137

An anonymous reader quotes a report from The Wrap: The fan-made "Pokemon Uranium" game took a pair of programmers more than nine years to develop. Nintendo needed just about nine days to kill it. "After receiving more than 1,500,000 downloads of our game, we have been notified of multiple takedown notices from lawyers representing Nintendo of America," the creators of "Pokemon Uranium" said in a statement. "While we have not personally been contacted, it's clear what their wishes are, and we respect those wishes deeply. Therefore, we will no longer provide official download links for the game through our website," they continued. "We have no connection to fans who re-upload the game files to their own hosts, and we cannot verify that those download links are all legitimate. We advise you to be extremely cautious about downloading the game from unofficial sources." The role-playing game was free, though creators @JVuranium and Involuntary Twitch were open to suggested PayPal donations of $2-$10. Set in the tropical Tandor region, "Uranium" players can encounter more than 150 all-new species of Pokemon in their quest to collect all eight Gym Badges and triumph over the Tandor League, per the official description. Along the way, the players must battle against a sinister threat that's causing Nuclear Meltdowns.

Slashdot Top Deals