From Burger King’s Google Home trigger and how tech scammer have made millions to the many vulnerabilities found in Linksys routers, & more!
Ransomware hidden inside a Word document that’s hidden inside a PDF
Spam campaign delivers Locky ransomware that, like a Russian matryoshka doll, is nested inside not one but two layers
What happens when a vendor doesn’t patch its software?
Third-party ‘guerilla’ patching can be a good example of the community stepping up to fix flaws – but it could also compromise security
Companies Are Paying Millions For White Hat Hacking
White hat hackers “are in very high demand,” says PwC’s director of cyber investigation and breach response, in a New York Post article titled “Companies are paying millions to get hacked — on purpose.” An anonymous reader quotes their report:…
Uber Tried To Hide Its Secret IPhone Fingerprinting From Apple
theodp quotes today’s New York Times profile of Uber CEO Travis Kalanick: For months, Mr. Kalanick had pulled a fast one on Apple by directing his employees to help camouflage the ride-hailing app from Apple’s engineers. The reason? So Apple…
Is Social Media Making Us Hate Each Other?
Nicholas Carr’s book The Shallows: What the Internet Is Doing to Our Brains was a finalist for the 2011 Pulitzer Prize. Now an anonymous Slashdot reader reports on Carr’s newest warning: It seems obvious: The more we learn about other…
Scientists Consider 'Cloud Brightening' To Preserve Australia's Great Barrier Reef
An anonymous reader quotes MIT Technology Review: A group of Australian marine scientists believe that altering clouds might offer one of the best hopes for saving the Great Barrier Reef. For the last six months, researchers at the Sydney Institute…
Ask Slashdot: Do You Like Functional Programming?
An anonymous reader writes: Functional programming seems to be all the rage these days. Efforts are being made to highlight its use in Java, JavaScript, C# and elsewhere. Lots of claims are being made about it’s virtues that seem relatively…