Slashdot Deals: Cyber Monday Sale! Courses ranging from coding to project management - all eLearning deals 25% off with coupon code "CYBERMONDAY25". ×

US Marshals Jump Into 'Cyber Monday' Mania ( 4

coondoggie writes: "Cyber Monday is generally thought to be the start of the online holiday shopping season. We would like to encourage shoppers who are already online in search of bargains to consider stopping by our auction website to bid on forfeited assets," said Jason Wojdylo, Chief Inspector of the U.S. Marshals Service Asset Forfeiture Division in a statement. These online auctions are designed to generate proceeds from ill-gotten gains to give back to victims, he stated. One auction includes a wine collection of approximately 2,800 bottles seized from once prominent wine dealer Rudy Kurniawan, who is serving a 10-year federal prison sentence following his conviction of selling millions of dollars of counterfeit wine.
The Almighty Buck

AT&T Will Raise Cost of Old Unlimited Data Plans By $5 In February ( 14

An anonymous reader writes: AT&T customers trying to hold on to their old unlimited-data plans will have to pay a little more starting in February. AT&T's legacy plans for unlimited data will soon be $35 a month, instead of the current $30, on top of normal monthly bill costs. The Verge reports: "This is the first price hike AT&T has levied on grandfathered unlimited customers in seven years; the plan in question was discontinued in 2010 and as such is no longer offered to new customers. The $35 unlimited data feature is in addition to the costs associated with your voice and texting plan(s)."

VTech Hack Gets Worse: Chat Logs, Kids' Photos Taken In Breach ( 23

An anonymous reader writes: The VTech hack just got a little worse. Reports say that in addition to the 4.8 million records with parents' names, home addresses, passwords and the identities of 227k kids, the hackers also have hundreds of gigabytes worth of pictures and chat logs belonging to children. ZDNet reports: "Tens of thousands of pictures — many blank or duplicates — were thought to have been taken from from Kid Connect, an app that allows parents to use a smartphone app to talk to their children through a VTech tablet. Motherboard was able to verify a portion of the images, and the chat logs, which date as far back as late-2014. Details about the intrusion are not fully known yet. The hacker, who for now remains nameless, told Motherboard that the Hong Kong-based company 'left other sensitive data exposed on its servers.'"

Researchers Create Sodium Battery In Industry Standard "18650" Format ( 65

Zothecula sends word that French team has developed a battery using sodium ions in the usual "18650" format. Gizmag reports: "A team of researchers in France has taken a major step towards powering our devices with rechargeable batteries based on an element that is far more abundant and cheaper than lithium. For the first time ever, a battery has been developed using sodium ions in the industry standard "18650" format used in laptop batteries, LED flashlights and the Tesla Model S, among other products."

Swallow the Doctor: The Present and Future of Robots Inside Us ( 22

szczys writes: Feynman predicted that we would some day "swallow the doctor" and to some extent that is already happening. There are cameras in pill-form that the patient swallows to monitor the digestive track, and pacemakers are now inserted via catheter rather than major surgery. The question is, where are we going with robots we can put inside our bodies. Intuitively it seems far away, but there is already an open source platform for capsule robots. Medical devices are where the money is at when it comes to hardware development. We can expect to see a lot of work in the coming years to make the man-machine hybrid something that is much more organic, sprinkled with small tablets of robot.
The Courts

Young Climate Activists Sue Obama Over Climate Change Inaction ( 220

EmagGeek writes A recent lawsuit against Obama alleges he has a legal duty to act against climate change, and young climate activists, including 15-year-old Xiuhtezcatl Tonatiuh, are taking him to task on it. CNN reports: "Xiuhtezcatl Tonatiuh became a climate change activist at age 6 when he saw an environmental documentary. He asked his mom to find a way for him to speak at a rally. Now 15, the long-haired, hip-hop-savvy Coloradan is one of 21 young activists joining climate scientist James Hansen in suing the Obama administration for failing to ditch fossil fuels. 'It's basically a bunch of kids saying you're not doing your job,' he told me here at the U.N. COP21 climate change summit in Paris. 'You're failing, you know. F-minus. We're holding you accountable for your lack of action.'"

Book Review: Security Operations Center 10

benrothke writes: Large enterprises have numerous information security challenges. Aside from the external threats; there's the onslaught of security data from disparate systems, platforms and applications. Getting a handle on the security output from numerous point solutions (anti-virus, routers/switches, firewalls, IDS/IPS, ERP, access control, identity management, single sign on and others), often generating tens of millions of messages and alerts daily is not a trivial endeavor. As attacks becoming more frequent and sophisticated and with regulatory compliance issues placing an increasing burden, there needs to be a better way to manage all of this. Getting the raw hardware, software and people to create a SOC is not that difficult. The challenge, and it's a big challenge, is integrating those 3 components to ensure that a formal SOC can operate effectively. In Security Operations Center: Building, Operating, and Maintaining your SOC, authors Joseph Muniz, Gary McIntyre and Nadhem AlFardan have written an indispensable reference on the topic. The authors have significant SOC development experience, and provide the reader with a detailed plan on all the steps involved in creating a SOC. Keep reading for the rest of Ben's review.

IoT Home Alarm System Can Be Easily Hacked and Spoofed ( 86

An anonymous reader writes: In the never-ending series of hackable, improperly protected IoT devices, today we hear about an IoT smart home alarm system that works over IP. Made by RSI Videofied, the W Panel features no encryption, no integrity protection, no sequence numbers for packets, and a predictable authentication system. Security researchers who investigated the devices say, "The RSI Videofied system has a level of security that is worthless. It looks like they tried something and used a common algorithm – AES – but messed it up so badly that they may as well have stuck with plaintext."

Hardware For a Cheap Linux Desktop ( 151

An anonymous reader writes: Outside of the limelight of Intel's Core "Skylake" processors is the cheapest model, a $60 Intel Pentium G4400 dual-core processor that runs at 3.3Gz and has built-in HD Graphics 510. Ubuntu Linux results for this CPU show the cut-down Skylake graphics are the worst aspect of this budget processor while the CPU performance is okay if speed isn't a big factor and your workloads don't mind the lack of AVX support. To pair with the cheap Skylake Pentium processors are more Intel H110-powered motherboards appearing, with some also retailing for under $60 while being basic yet functional as a severely cutdown version of the Intel Z170 chipset. If pursuing this route for a budget Linux PC, it's possible to build a socketed Skylake system for less than $200. Those of you who have recently build, or are planning out a new budget Linux machine, what internals do you recommend?

Rikers Inmates Learn How To Code Without Internet Access ( 145

An anonymous reader sends the story of another prison where inmates are learning the basics of programming, despite having no access to the vast educational resources on the internet. Instructors from Columbia University have held a lengthy class at New York's Rikers Island prison to teach the basics of Python. Similar projects have been attempted in California and Oklahoma. The goal wasn’t to turn the students into professional-grade programmers in just a few classes, [Instructor Dennis] Tenen emphasizes, but to introduce them to the basics of programming and reasoning about algorithms and code. "It’s really to give people a taste, to get people excited about coding, in hopes that when they come out, they continue," says Tenen. ...Having an explicit goal—building the Twitter bot—helped the class focus its limited time quickly on learning to do concrete tasks, instead of getting bogged down in abstract discussions of syntax and algorithms.
The Internet

New Campaign Features Internet Trolls On Roadside Billboards ( 135

An anonymous reader writes: A campaign taking shape in Brazil seeks to fight online harassment in an unusual way: by posting the abusive comments on real billboards. "The group collects comments from Facebook or Twitter and uses geolocation tools to find out where the people who have posted them live. They then buy billboard space nearby and post the comments in huge letters, although names and photos are pixelated." Brazil has laws prohibiting racial abuse, but this group doesn't think the government is doing enough to stop it. The campaign's founder said, "Those people [who post abuse online] think they can sit in the comfort of their homes and do whatever they want on the internet. We don't let that happen. They can't hide from us, we will find them."
The Internet

Companies Want To Insert Ads Into Unicode ( 210

AmiMoJo writes: Food company Nestle has started a petition to get a KitKat emoji into the Unicode standard. They aren't alone, Taco Bell wants a taco emoji added, and Durex suggested adding a condom. While the latter two are at least generic, KitKat is a trademark of Nestle and the "break" image a key part of their marketing. Next year Unicode will include a faceplam emoji (U+1F926) for occasions such as this.

It's Getting Harder To Reside Anonymously In a Modern City ( 90

dkatana writes: In a panel on 'Privacy in the Smart City' during this month's Smart City World Congress, Dr. Carmela Troncoso, a researcher from Spain, argued that data anonymization itself is almost impossible without using advanced cryptography. Our every transaction leaves a digital marker that can be mined by anyone with the right tools or enough determination.

Most modern cities today are full of sensors and connected devices. Some are considering giving away free WiFi in exchange of personal data. LinkNYC, which was present at the congress as exhibitor, is one such example of this. The panelists insisted that it is the duty of world leaders to safeguard their citizens' privacy, just as corporations are answerable to leaks and hacks.


How Technology Is Increasing the Number of Jobs We Have ( 207

An anonymous reader writes: An article at The Guardian takes a look at the way in which we hold jobs as technology as changes. Its central thesis is this: "My father had one job in his life, I've had six in mine, my kids will have six at the same time." This may compress the generational changes a bit, but it's an interesting point; the average time people spend at one job has been trending downward for a long time. As technology enables the so-called "gig economy" (or "sharing economy," if you prefer), we're seeing many more people start to hold multiple jobs, working whichever one happens to give them something to do at a given time. Economist Jeremy Rifkin says, "This sharing economy is reestablishing the commons in a hi-tech landscape. Commons came about when people formed communities by taking the meager resources they had and sharing then to create more value. The method of regulation of these systems is also comparable. If people are trusted and vouched for they are accepted as part of the sharing economy group. If they behave badly they are excluded. Your social capital means everything in this new economy."