1. IT-Security >
  2. Cyber Security Nachrichten


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese
Anzeige

Nachrichten


Suchen

The Last Independent Mobile OS

IT Security Nachrichten vom 16.12.2018 um 15:14 Uhr | Quelle hardware.slashdot.org
An anonymous reader quotes a report from Motherboard: The year was 2010 and the future of mobile computing was looking bright. The iPhone was barely three years old, Google's Android had yet to swallow the smartphone market whole, and half a dozen alternative mobile operating systems -- many of which were devoutly open source -- were preparing for launch. Eight years on, you probably haven't even heard of most of these alternative mobile operating systems, much less use them. Today, Android and iOS dominate the global smartphone market and account for 99.9 percent of mobile operating systems. Even Microsoft and Blackberry, longtime players in the mobile space with massive revenue streams, have all but left the space. Then there's Jolla, the small Finnish tech company behind Sailfish OS, which it bills as the "last independent alternative mobile operating system." Jolla has had to walk itself back from the edge of destruction several times over the course of its seven year existence, and each time it has emerged battered, but more determined than ever to carve out a spot in the world for a truly independent, open source mobile operating system. Jolla's Sailfish OS rose from the ashes of Nokia and Intel's ill-fated collaboration, MeeGo. The MeeGo project launched in 2010 in an attempt to merge Intel's Linux-based Moblin OS and Nokia's Maemo software platform into a single open-source mobile operating system that could take on Google. By 2011, Android had already surpassed Nokia in the smartphone market, a fact that wasn't lost on Nokia's CEO Stephen Elop, who in a memo described the company as standing on a "burning platform." Nokia only ever released one phone running MeeGo: the Nokia N9, which ended up being well received despite its limited release. But it was too little, too late. By 2011, Nokia was bleeding talent and it was clear that MeeGo wasn't going to keep the company competitive in the rapidly changing smartphone market. In a last-ditch effort, Nokia struck a partnership with Microsoft to provide the hardware for its next generation of Windows Phones, abandoning MeeGo entirely. The same couldn't be said for those developers who had worked on MeeGo and, before that, an open source mobile OS called Mer, based on Intel's Maemo system. In October 2011, three developers that had worked on Mer sent a message on a mailing list calling for the creation of a "MeeGo 2.0." At the same time, developer Sami Pienimaki and two others left Nokia to found their own company, which would use this new version of MeeGo as the basis for an open source mobile OS. And thus, Sailfish was born. In a cheeky homage to the "burning platform" memo, Pienimaki and his fellow defectors decided to name their company Jolla, a Finnish word connoting a small boat or life raft. Jolla has since turned to Russia and China, both of which were hungry for a secure alternative to Google-based systems. In late 2016, Sailfish OS achieved domestic certification in Russia for government and corporate us. Around the same time, Sailfish was also making moves in China. In early 2017, the Sailfish China Consortium gained the exclusive rights and license to develop a Chinese OS based on Sailfish.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

How to Connect to anyone's computer Remotely - Tutorial

IT Security Nachrichten vom 16.12.2018 um 15:10 Uhr | Quelle reddit.com

I have created a series of videos in which I teach people how to build a tool called Reverse Shell in Python using which you can connect to a computer or multiple computers remotely.

I start by teaching basics of networking then I start coding the actual tool in Python.

If you are interested you can find the playlist at - Python Network Programming - TCP/IP Socket Programming

submitted by /u/attreya12
[link] [comments]
Newsbewertung

Weiterlesen

encrypt google drive and one-note?

IT Security Nachrichten vom 16.12.2018 um 14:59 Uhr | Quelle reddit.com

I am throwing in the towel and moving to some cloud based services for home and work use. I use onenote which I assume is linked to a OneDrive account and I have access to 200gb google drive that came with my Chromebook. Is it possible for me to encrypt OneNote notebooks? What is a good software for encrypting files on google drive? preferably something that works with ChromeOS? Thanks!

submitted by /u/eenduser89
[link] [comments]
Newsbewertung

Weiterlesen

Is there possibility to hack monitor remotely.

IT Security Nachrichten vom 16.12.2018 um 14:42 Uhr | Quelle reddit.com

I want to buy a new monitor.

I was reading about security of such the device and found something interesting.

https://www.pcworld.com/article/3104978/this-pc-monitor-hack-can-manipulate-pixels-for-malicious-effect.html

https://motherboard.vice.com/en_us/article/jpgdzb/hackers-could-break-into-your-monitor-to-spy-on-you-and-manipulate-your-pixels

As I understood this method, the researchers from Red Balloon Security have found a way to flash exploit to firmware of monitor. But this was just because they could open the monitor and do so.

I am wondering if there is any method to do it remotely or if it is even feasable / possible ?

Then the other question is - if monitor manufacturers have been already caught red handed to do such an exploit backdoor like I have mentioned ? Well they can install any exploit in firmware. But until now, did any of them was caught red handed about it ?

I consider any form of spying and also pixel changes method as a malicious.

I know it is kind of rare to be hacked that way. I am just wondering how I can minimalize it.

Additionaly: is there any other way of security threat using the monitor device I am not aware about ?

submitted by /u/GuessMeQuickly
[link] [comments]
Newsbewertung

Weiterlesen

Bitglass: Securing Smartsheet from Day One

IT Security Nachrichten vom 16.12.2018 um 14:17 Uhr | Quelle cybersecurity-insiders.com

This post was originally published here by  Will Houcheime. Smartsheet is a software-as-a-service (SaaS) applicationthat gives employees the ability to assign tasks, manage projects, and track their progress. According to Forbes, it is being used by 72 percent of Fortune 500 companies. However, without advanced cloud security solutions, companies put themselves at risk when working with apps […]

The post Bitglass: Securing Smartsheet from Day One appeared first on Cybersecurity Insiders.


Newsbewertung

Weiterlesen

Reflections from Gartner’s IAM Summit 2018

IT Security Nachrichten vom 16.12.2018 um 14:04 Uhr | Quelle cybersecurity-insiders.com

This post was originally published here by Sophia Zheng. The Bitglass team just returned from the Gartner Identity and Access Management Summit in Las Vegas. At the booth and during speaking sessions, it seemed like there were several trends in identity and data protection that continually bubbled to the surface. First, the use of user […]

The post Reflections from Gartner’s IAM Summit 2018 appeared first on Cybersecurity Insiders.


Newsbewertung

Weiterlesen

Port 8545 and Ethereum Wallets, A Very Bad Combination

IT Security Nachrichten vom 16.12.2018 um 14:00 Uhr | Quelle hackercombat.com

Ethereum has for quite a while became a compelling alternative to Bitcoins. With a much lower price, easier to mine (as the hashes are not yet as complex as Bitcoin)...

The post Port 8545 and Ethereum Wallets, A Very Bad Combination appeared first on .


Newsbewertung

Weiterlesen

Country's efforts to slow signal and other apps is a

IT Security Nachrichten vom 16.12.2018 um 13:41 Uhr | Quelle reddit.com
Country's efforts to slow signal and other apps is a submitted by /u/RonaldvanderMeer
[link] [comments]

Newsbewertung

Weiterlesen

Diablo 3 - Nintendo zeigt neuen Live-Action-Trailer zur Switch-Version

IT Security Nachrichten vom 16.12.2018 um 13:35 Uhr | Quelle winfuture.de
Trailer, Nintendo, Rollenspiel, Blizzard, Nintendo Switch, Diablo 3, Diablo, diablo III, Eternal Collection Mit der sogenannten Eternal Collection ist Diablo 3 inzwischen auch für die Nintendo Switch erhältlich. In der Weihnachtszeit rühren Nintendo und Blizzard noch einmal ordentlich die Werbetrommel und haben jetzt einen neuen Live-Action-Trailer veröffentlicht, der vor allem die Möglichkeit zum Spielen unterwegs in den Mittelpunkt rückt. Das Action-Rollenspiel enthält auf der Nintendo Switch neben den beiden Erweiterungen Reaper of Souls und Rückkehr des Toten­be­schwö­rers noch einige ... (Weiter lesen)
Newsbewertung

Weiterlesen

LDAP_Search - Tool To Perform LDAP Queries And Enumerate Users, Groups, And Computers From Windows Domains

IT Security Nachrichten vom 16.12.2018 um 13:34 Uhr | Quelle feedproxy.google.com

LDAP_Search can be used to enumerate Users, Groups, and Computers on a Windows Domain. Authentication can be performed using traditional username and password, or NTLM hash. In addition, this tool has been modified to allow brute force/password-spraying via LDAP. Ldap_Search makes use of Impackets python36 branch to perform the main operations. (These are the guys that did the real heavy lifting and deserve the credit!)

Installation
git clone --recursive https://github.com/m8r0wn/ldap_search
cd ldap_search
sudo chmod +x setup.sh
sudo ./setup.sh

Usage
Enumerate all active users on a domain:
python3 ldap_search.py users -u user1 -p Password1 -d demo.local
Lookup a single user and display field headings:
python3 ldap_search.py users -q AdminUser -u user1 -p Password1 -d demo.local
Enumerate all computers on a domain:
python3 ldap_search.py computers -u user1 -p Password1 -d demo.local
Search for end of life systems on the domain:
python3 ldap_search.py computers -q eol -u user1 -p Password1 -d demo.local -s DC01.demo.local
Enumerate all groups on the domain:
python3 ldap_search.py groups -u user1 -p Password1 -d demo.local -s 192.168.1.1
Query group members:
python3 ldap_search.py groups -q "Domain Admins" -u user1 -p Password1 -d demo.local

Queries
Below are the query options that can be specified using the "-q" argument:
User
active / [None] - All active users (Default)
all - All users, even disabled
[specific account or email] - lookup user, ex. "m8r0wn"

group
[None] - All domain groups
[Specific group name] - lookup group members, ex. "Domain Admins"

computer
[None] - All Domain Computers
eol - look for all end of life systems on domain

Options
positional arguments:
lookup_type Lookup Types: user, group, computer

optional arguments:
-q QUERY Specify user or group to query or use eol.
-u USER Single username
-U USER Users.txt file
-p PASSWD Single password
-P PASSWD Password.txt file
-H HASH Use Hash for Authentication
-d DOMAIN Domain (Ex. demo.local)
-s SRV, -srv SRV LDAP Server (optional)
-t TIMEOUT Connection Timeout (Default: 4)
-v Show Search Result Attribute Names
-vv Show Failed Logins & Errors



Newsbewertung

Weiterlesen

The Nasty Operation of KingMiner Monero Cryptomining Trojan

IT Security Nachrichten vom 16.12.2018 um 13:24 Uhr | Quelle hackercombat.com

2018 is becoming the year of cryptomining malware, a subtle virus compared to the very loud ransomware which dominated the 2017 malware scene. Ransomware came into the mainstream last year,...

The post The Nasty Operation of KingMiner Monero Cryptomining Trojan appeared first on .


Newsbewertung

Weiterlesen

Another Facebook Bug Exposed Private Photos Of 6.8M Users

IT Security Nachrichten vom 16.12.2018 um 13:23 Uhr | Quelle latesthackingnews.com

Facebook troubles and the resultant chaos have now become so frequent that it won’t be wrong to consider them a

Another Facebook Bug Exposed Private Photos Of 6.8M Users on Latest Hacking News.


Newsbewertung

Weiterlesen

Sean Parker Builds Beach-Access App To Atone For His Rule-Violating Wedding

IT Security Nachrichten vom 16.12.2018 um 12:34 Uhr | Quelle tech.slashdot.org
An anonymous reader quotes the Associated Press: A tech billionaire whose elaborate wedding in a redwood grove violated California rules has helped create a smartphone app that shows users a map of more than 1,500 spots where people can get to the coastline. The California Coastal Commission unveiled the YourCoast app at its meeting Thursday in Newport Beach. "This is an only in California story," Commission Chair Dayna Bochco said in a statement. "Where else could you find a tech mogul partnering with a regulator to help the public get to the beach?" Sean Parker, co-founder of file-sharing service Napster, agreed to help make the educational tool after he built a large site resembling a movie set for his wedding in an ecologically sensitive area of Big Sur without proper permits. However, the commission determined the construction in a campground area wouldn't harm the environment and the wedding was allowed to proceed. Parker, a former president of Facebook, also paid $2.5 million in penalties, which helped fund hiking trails, field trips and other efforts to increase public access to the popular tourist area. It was a rare high-profile coastal violation case resolved with cooperation rather than a legal fight.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

some free vpn service android app collecting users data including their behavior

IT Security Nachrichten vom 16.12.2018 um 12:19 Uhr | Quelle reddit.com
submitted by /u/prosen780
[link] [comments]
Newsbewertung

Weiterlesen

BSI hat keine Bedenken oder gar Beweise im "Spionagefall Huawei"

IT Security Nachrichten vom 16.12.2018 um 11:37 Uhr | Quelle winfuture.de
Polizei, Kriminalität, Fbi, Agent Das Bundesamt für Sicherheit in der Informationstechnik (BSI) hat sich jetzt zum Streit um die Spionagevorwürfe gegen das chinesische Unternehmen Huawei zu Wort gemeldet. In einem Interview erklärte der BSI-Chef Arne Schönbohm, dass man für drastische Maßnahmen wie in den USA hierzulande derzeit keine Beweggründe habe. (Weiter lesen)
Newsbewertung

Weiterlesen

Smart Innovation Steyr feiert 5-jähriges Jubiläum

IT Security Nachrichten vom 16.12.2018 um 10:22 Uhr | Quelle google.com
Auch 2019 wird Smart Innovation Steyr vieles bewegen. Der Fokus liegt auf Bewährtes wie die Stammtische 4.0, der IT Security Summit VISIT und ...
Newsbewertung

Weiterlesen

Smart Innovation Steyr feiert 5-jähriges Jubiläum

IT Security Nachrichten vom 16.12.2018 um 10:22 Uhr | Quelle google.com
Auch 2019 wird Smart Innovation Steyr vieles bewegen. Der Fokus liegt auf Bewährtes wie die Stammtische 4.0, der IT Security Summit VISIT und ...
Newsbewertung

Weiterlesen

Netflix für Comics: InkyPen startet am Montag für die Nintendo Switch

IT Security Nachrichten vom 16.12.2018 um 09:59 Uhr | Quelle winfuture.de
Konsole, Nintendo, Netflix, Nintendo Konsole, Nintendo Switch, Switch, Release, Flatrate, Ankündigung, Service, Abonnement, Comics, Erscheinungstermin, InkyPen Während der beliebte Streaming-Dienst Netflix noch immer nicht für die Nintendo Switch zur Verfügung steht, wird jetzt ein weiterer Abo-Service auf die Hybrid-Konsole gebracht. Der Comic-Dienst InkyPen wurde schon auf der Gamescom 2018 exklusiv für die Nintendo Switch angekündigt. (Weiter lesen)
Newsbewertung

Weiterlesen

Christmas Calendar: A pragmatic look at secure password storage for users

IT Security Nachrichten vom 16.12.2018 um 09:47 Uhr | Quelle reddit.com
Christmas Calendar: A pragmatic look at secure password storage for users submitted by /u/stian_f
[link] [comments]

Newsbewertung

Weiterlesen

Mutant Year Zero: Road to Eden Review (PC)

IT Security Nachrichten vom 16.12.2018 um 09:47 Uhr | Quelle softpedia.com
Some would say that X-COM is the father of the turn-based strategy genre, mostly because every new game that tackles the same genre is influenced by Take-Two's cult franchise. Mutant Year Zero: Road to Eden is no exception, although it would be totally unfair to say that it's an X-COM ripoff. Mutant Year Zero is quite unique, not just because it masterfully blends turn-based strategy and real-time stealth elements, but also because of the setting and characters. Many of you probably didn't know (I for sure didn't) that the game is based on the Mutant Year Zero tabletop RPG featuring half human half animal mutants, psionics and other weird forms of life. In this particular case, the folks at The Bearded Ladies chose to depict a post-apocalyptic Scandinavia (if you're living there, you'll most certainly recognize some locations). Although it's quite light on the story and lore, Mutant Year Zero delivers a surprisingly solid experience from the beginning to the end. ...
Newsbewertung

Weiterlesen

Study Reveals The Most Googled 'Should I' Questions In Each State

IT Security Nachrichten vom 16.12.2018 um 09:34 Uhr | Quelle tech.slashdot.org
An anonymous reader quotes BGR: One of the more interesting 2018 retrospectives we've seen focuses on which Google searches were the most popular across each state. Specifically, AT&T tapped into data from Google Trends and came up with a rather amusing look at the most popular "should I..." questions on a state by state basis. "Should I vote" was the most-popular question in seven states, which isn't surprising, given the exciting races in many areas. Indiana and Michigan, on the other hand, are more concerned with the other four-letter v-word: vape. Other interesting results: The most popular question in Washington was "Should I delete Facebook?" The most popular question in California was "Should I move out?" The most popular question in Texas was "Should I apologize?" The most popular question in both Nevada and New Hampshire was "Should I buy bitcoin?" Although the article warns that "If you're asking Google what you should or shouldn't do, you probably already know the answer."

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

War der Datendiebstahl bei der Marriott-Hotelkette politisch motiviert?

IT Security Nachrichten vom 16.12.2018 um 09:26 Uhr | Quelle google.com
Das melden die Security-Experten von Vectra. ... Gérard Bauer, VP EMEA bei Vectra, einem Anbieter von IT-Security auf Basis künstlicher Intelligenz, ...
Newsbewertung

Weiterlesen

Gekaufte Bewertung: Amazon wird Angebot der Fake Reviews nicht Herr

IT Security Nachrichten vom 16.12.2018 um 09:20 Uhr | Quelle winfuture.de
Amazon, Logo, Versandhandel Auch nach Amazons Feldzug gegen gefälschte, bezahlte, positive Produktbewertungen geht das Treiben mit den Fake Reviews munter weiter. Jetzt hat auch die Stiftung Warentest das Thema wieder aufgenommen und warnt vor vermeintlichen Nutzerbewertungen, die miese Produkte hochjubeln. (Weiter lesen)
Newsbewertung

Weiterlesen

The Google Pixel 3 Experiment: Two Weeks Without My iPhone

IT Security Nachrichten vom 16.12.2018 um 08:20 Uhr | Quelle news.softpedia.com
Two weeks ago, just after Google rolled out an advertising campaign called Unswitchable, I decided to test the search giant’s claims on my own. While you can read more about this experiment here, the idea behind this whole thing is to test Google’s promise that the Google Pixel 3 makes you love it after just three weeks of use no matter what phone you owned before. My preliminary conclusions after a week with the Pixel 3 are available here, but if you’re more interested in a TLDR, it basically comes down to this. I was still unswitchable, and while...
Newsbewertung

Weiterlesen

Crash analytics

IT Security Nachrichten vom 16.12.2018 um 07:34 Uhr | Quelle reddit.com

Hey guys I have found a pwSafe substitute for Mac/IOS and I really like everything about it....

But it is supposed to be an offline password manager and it has crash analytics... what would you guys think about a password app that is reporting crash analytics? Would it bother you or should I ditch it now?

submitted by /u/imillonario
[link] [comments]
Newsbewertung

Weiterlesen

Sieben Tipps für die Auswahl einer Backup-Infrastruktur

IT Security Nachrichten vom 16.12.2018 um 07:01 Uhr | Quelle it-daily.net

Backups in der Cloud bieten viele Vorteile, zum Beispiel Zugriff jederzeit und von überall aus. Es gibt aber auch einiges zu beachten, etwa um Kostenexplosionen zu vermeiden. Je nach Anforderungen kann sich daher eine On-Premises- oder eine hybride Lösung empfehlen.


Newsbewertung

Weiterlesen

Is The World Shifting To 'Ambient Computing'?

IT Security Nachrichten vom 16.12.2018 um 06:34 Uhr | Quelle tech.slashdot.org
In the future, "A massive convergence of technologies will enable us to use computers and the internet without really using them," argues Computerworld. At the dawn of the personal computing revolution, people "operated" a computer. They sat down and did computing -- often programming. Later, with the application explosion, operators became "users." People used computers for purposes other than programming or operating a computer -- like balancing their checkbooks or playing video games. All computing uses so far have required a cognitive shift from doing something in the real world to operating or using a computer. Ambient computing changes all that, because it involves using a computer without consciously or deliberately or explicitly "using" a computer.... It's just there, guiding and nudging you along as you accomplish things in life. Ambient computing devices will operate invisibly in the background. They'll identify, monitor and listen to us and respond to our perceived needs and habits. So a good working definition of ambient computing is "computing that happens in the background without the active participation of the user...." In 20 years, the idea of picking up a device or sitting down at a computer to actively use it will seem quaintly antiquated. All computing will be ambient -- all around us all the time, whispering in our ear, augmenting the real world through our prescription eyeglasses and car windshields, perceiving our emotions and desires and taking action in the background to help us reach our business goals and live a better life. Between now and then we'll all ride together on a very interesting journey from computers we actively use to computing resources increasingly acting in the background for us. Though the article identifies smart speakers are the first ambient computing devices most people will encounter, it's argues that that's just the beginning of a much larger change. "We're also going to be flooded and overwhelmed by the 'ambient computing' hype as, I predict, it will become one of the most overused and abused marketing buzzwords ever."

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Top 10 Best Programming Apps for Android (Latest)

IT Security Nachrichten vom 16.12.2018 um 06:17 Uhr | Quelle itechhacks.com

Programming is the essential core to become a Hacker. But many says, we can only learn Programming on PC but in 2019, there are number free apps available on play store through which you could easily learn programming. (Best programming apps) Android mobiles may not be an ideal workplace for programmers. Laptops and PC’s are […]

The post Top 10 Best Programming Apps for Android (Latest) appeared first on iTech Hacks.


Newsbewertung

Weiterlesen

Adventszeit: Spam nimmt Online-Shopper ins Visier

IT Security Nachrichten vom 16.12.2018 um 06:01 Uhr | Quelle it-daily.net

Der IT-Sicherheitsanbieter F-Secure warnt vor Spam-Mails als beliebte Angriffsmethode in der Adventszeit. Die Taktik, schädliche Inhalte in Versandhinweisen oder Rechnungen zu verstecken, ist laut Forschern von F-Secure in der Vorweihnachtszeit noch effektiver als normalerweise.


Newsbewertung

Weiterlesen

How Microsoft Embraced Python

IT Security Nachrichten vom 16.12.2018 um 03:34 Uhr | Quelle developers.slashdot.org
Steve Dower, a Python developer at Microsoft, describes how the language become popular internally: In 2010, our few Pythonistas were flying under the radar, in case somebody noticed that they could reassign a few developers to their own project. The team was small, leftover from a previous job, but was chipping away at a company culture that suffered from "not invented here" syndrome: Python was a language that belonged to other people, and so Microsoft was not interested. Over the last eight years, the change has been dramatic. Many Microsoft products now include Python support, and some of the newest only support Python. Some of our critical tools are written in Python, and we are actively investing in the language and community.... In 2018, we are out and proud about Python, supporting it in our developer tools such as Visual Studio and Visual Studio Code, hosting it in Azure Notebooks, and using it to build end-user experiences like the Azure CLI. We employ five core CPython developers and many other contributors, are strong supporters of open-source data science through NumFOCUS and PyData, and regularly sponsor, host, and attend Python events around the world. "We often felt like a small startup within a very large company" Downer writes, in a post for the Medium community "Microsoft Open Source Stories."

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

People Are Harassing Waymo's Self-Driving Vehicles

IT Security Nachrichten vom 16.12.2018 um 01:34 Uhr | Quelle tech.slashdot.org
Waymo's testing dozens of self-driving mini-vans near Phoenix. Now the Arizona Republic asks why the vehicles are getting so much hate, citing "a slashed tire, a pointed gun, bullies on the road..." "Police have responded to dozens of calls regarding people threatening and harassing Waymo vans." That was clear August 19, when police were called because a 37-year-old man who police described as "heavily intoxicated" was standing in front of a Waymo and not allowing the van to proceed. "He stated he was sick and tired of the Waymo vehicles driving in his neighborhood, and apparently thought the best idea to resolve this was to stand in front of one of these vehicles," Officer Richard Rimbach wrote in a report. Phil Simon, an information systems lecturer at Arizona State University and author of several books on technology, said angst from residents is probably less about how the Waymo vans drive and more about people frustrated with what Waymo represents. "This stuff is happening fast and a lot of people are concerned that technology is going to run them out of a job," Simon said. Simon said it is hard for middle-class people to celebrate technological breakthroughs like self-driving cars if they have seen their own wages stagnate or even decline in recent years. "There are always winners and losers, and these are probably people who are afraid and this is a way for them to fight back in some small, futile way," Simon said. "Something tells me these are not college professors or vice presidents who are doing well." Police used video footage from Waymo to identify the license plate of a Jeep that kept driving head-on toward Waymo's test car -- six different times, one in which the driver then slammed on the brakes, jumped out of their car, and demanded that Waymo get out of their neighborhood. Another local resident told the newspaper that "Everybody hates Waymo drivers. They are dangerous." On four separate occasions, people have thrown rocks. A 69-year-old man was even arrested for pointing a revolver at the test driver in a passing Waymo car. He later told police he was trying to scare Waymo's driver, and "stated that he despises and hates those cars." He was charged with aggravated assault and disorderly conduct. The man's wife told reporters he'd been diagnosed with dementia, but the Arizona Republic calls it "one of at least 21 interactions documented by local police during the past two years where people have harassed the autonomous vehicles and their human test drivers," adding "There may be many undocumented instances where people threatened Waymo drivers..." "The self-driving vans use radar, lidar and cameras to navigate, so they capture footage of all interactions that usually is clear enough to identify people and read license plates," the paper adds. (Waymo later cites its "ongoing work" with communities "including Arizona law enforcement and first responders.") When one local news crew followed Waymo vehicles for 170 miles to critique their driving, a Waymo driver eventually pulled into a police station "because the driver was concerned we might've been harassing them. After they learned we were with the media, they let us go on our way."

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

People Are Harassing Waymo's Self-Driving Vehicles

IT Security Nachrichten vom 16.12.2018 um 01:34 Uhr | Quelle tech.slashdot.org
Waymo's testing dozens of self-driving mini-vans near Phoenix. Now the Arizona Republic asks why the vehicles are getting so much hate, citing "a slashed tire, a pointed gun, bullies on the road..." "Police have responded to dozens of calls regarding people threatening and harassing Waymo vans." That was clear August 19, when police were called because a 37-year-old man who police described as "heavily intoxicated" was standing in front of a Waymo and not allowing the van to proceed. "He stated he was sick and tired of the Waymo vehicles driving in his neighborhood, and apparently thought the best idea to resolve this was to stand in front of one of these vehicles," Officer Richard Rimbach wrote in a report. Phil Simon, an information systems lecturer at Arizona State University and author of several books on technology, said angst from residents is probably less about how the Waymo vans drive and more about people frustrated with what Waymo represents. "This stuff is happening fast and a lot of people are concerned that technology is going to run them out of a job," Simon said. Simon said it is hard for middle-class people to celebrate technological breakthroughs like self-driving cars if they have seen their own wages stagnate or even decline in recent years. "There are always winners and losers, and these are probably people who are afraid and this is a way for them to fight back in some small, futile way," Simon said. "Something tells me these are not college professors or vice presidents who are doing well." Police used video footage from Waymo to identify the license plate of a Jeep that kept driving head-on toward Waymo's test car -- six different times, one in which the driver then slammed on the brakes, jumped out of their car, and demanded that Waymo get out of their neighborhood. Another local resident told the newspaper that "Everybody hates Waymo drivers. They are dangerous." On four separate occasions, people have thrown rocks. A 69-year-old man was even arrested for pointing a revolver at the test driver in a passing Waymo car. He later told police he was trying to scare Waymo's driver, and "stated that he despises and hates those cars." He was charged with aggravated assault and disorderly conduct. The man's wife told reporters he'd been diagnosed with dementia, but the Arizona Republic calls it "one of at least 21 interactions documented by local police during the past two years where people have harassed the autonomous vehicles and their human test drivers," adding "There may be many undocumented instances where people threatened Waymo drivers..." "The self-driving vans use radar, lidar and cameras to navigate, so they capture footage of all interactions that usually is clear enough to identify people and read license plates," the paper adds. (Waymo later cites its "ongoing work" with communities "including Arizona law enforcement and first responders.") When one local news crew followed Waymo vehicles for 170 miles to critique their driving, a Waymo driver eventually pulled into a police station "because the driver was concerned we might've been harassing them. After they learned we were with the media, they let us go on our way."

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

CNN Contributor Urges: Stop Calling Facebook a Tech Company

IT Security Nachrichten vom 16.12.2018 um 00:35 Uhr | Quelle yro.slashdot.org
An anonymous reader quotes a CNN opinion piece by Stanford business school lecturer David Dodson: "Senator, we run ads." That's what Mark Zuckerberg told Senator Orrin Hatch earlier this year during his congressional testimony when asked to describe Facebook's business model. The 84-year-old senator was later mocked on social media for not understanding modern technology. But I'd argue that the wily senior senator understood Facebook's business quite well. Hatch was simply getting Mark Zuckerberg to say it out loud. Sometimes it takes an old guy to call out a youngster.... For media companies that run ads, especially ones that use public networks, we tell them that they can't lie or mislead, that it's not okay to advertise cigarettes to children or push prescription drugs without including the risks. We have laws governing deceptive advertisements and Truth in Advertising laws. Companies that run ads can't say a car gets 40 miles per gallon unless it's true. They can't say a movie won an Academy Award unless it did. If you say the wool comes from New Zealand, it must.... When nearly half of Americans get their news from Facebook, its newsfeed should be subjected to the same standards of fairness, decency and accuracy as newspapers, television and other media outlets.... Calling Facebook a tech company is how we got into so much trouble. It's also why, when Zuckerberg answered Hatch, the 34-year-old billionaire smiled in a way that was interpreted by many as smug. As if the senator was too antiquated to grasp the complexities of Facebook's revenue model. I see it differently. The company founder was offering a grin of acknowledgment. The jig was up. Facebook places ads just like most media companies do and should be held to the same overall standards.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Do Alternative Software Licenses Represent Open Source's 'Midlife Crisis'?

IT Security Nachrichten vom 15.12.2018 um 23:34 Uhr | Quelle news.slashdot.org
"it is clear to me that open source -- now several decades old and fully adult -- is going through its own midlife crisis," writes Joyent CTO Bryan Cantrill. [O]pen source business models are really tough, selling software-as-a-service is one of the most natural of them, the cloud service providers are really good at it -- and their commercial appetites seem boundless. And, like a new cherry red two-seater sports car next to a minivan in a suburban driveway, some open source companies are dealing with this crisis exceptionally poorly: they are trying to restrict the way that their open source software can be used. These companies want it both ways: they want the advantages of open source -- the community, the positivity, the energy, the adoption, the downloads -- but they also want to enjoy the fruits of proprietary software companies in software lock-in and its concomitant monopolistic rents. If this were entirely transparent (that is, if some bits were merely being made explicitly proprietary), it would be fine: we could accept these companies as essentially proprietary software companies, albeit with an open source loss-leader. But instead, these companies are trying to license their way into this self-contradictory world: continuing to claim to be entirely open source, but perverting the license under which portions of that source are available. Most gallingly, they are doing this by hijacking open source nomenclature. Of these, the laughably named commons clause is the worst offender (it is plainly designed to be confused with the purely virtuous creative commons), but others...are little better... "[T]heir business model isn't their community's problem, and they should please stop trying to make it one," Cantrill writes, adding letter that "As we collectively internalize that open source is not a business model on its own, we will likely see fewer VC-funded open source companies (though I'm honestly not sure that that's a bad thing)..." He also points out that "Even though the VC that led the last round wants to puke into a trashcan whenever they hear it, business models like 'support', 'services' and 'training' are entirely viable!" Jay Kreps, Co-founder of @confluentinc, has posted a rebuttal on Medium. "How do you describe a license that lets you run, modify, fork, and redistribute the code and do virtually anything other than offer a competing SaaS offering of the product? I think Bryan's sentiment may be that it should be called the Evil Proprietary Corruption of Open Source License or something like that, but, well, we disagree."

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Hackers Enslaving More and More Smart Home Networks

IT Security Nachrichten vom 15.12.2018 um 23:30 Uhr | Quelle hackercombat.com

The name given to smart home devices may actually be a misnomer given the findings of Netscout, a security research firm. According to the researchers, hackers are increasingly using the...

The post Hackers Enslaving More and More Smart Home Networks appeared first on .


Newsbewertung

Weiterlesen

Seitennavigation

Seite 10 von 3.117 Seiten (Bei Beitrag 315 - 350)
109.065x Beiträge in dieser Kategorie

Auf Seite 9 zurück | Nächste 11 Seite | Letzte Seite
[ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [10] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ]