Changing Other People's Flight Bookings Is Too Easy

Changing Other People's Flight Bookings Is Too Easy

“The security of online travel booking systems are stuck in the 1990s, according to security researchers,” reports Computerworld. An anonymous reader quotes their article, which argues that the ancient systems are also “woefully insecure”: This allows attackers to easily modify…

Creepy Site Claims To Reveal Torrenting Histories

Creepy Site Claims To Reveal Torrenting Histories

Slashdot reader dryriver writes: The highly invasive and possibly Russian owned and operated website IKnowWhatYouDownload.com immediately shows [a] bittorent download history for your IP address when you land on it. What’s more, it also [claims to] show the torrenting history…

Let's Raise A Glass To The Many Tech Pioneers Who Died In 2016
Google and Facebook Dominate The List of 2016's Top Ten Apps

Google and Facebook Dominate The List of 2016's Top Ten Apps

After surveying over 9,000 Android and iPhone users, Nielsen’s “Electronic Mobile Measurement” has calculated the 10 most popular apps of 2016. Interestingly, the #1 and #2 most popular apps of the year were Facebook and Facebook Messenger. BrianFagioli writes: Facebook…

Can Learning Smalltalk Make You A Better Programmer?

Can Learning Smalltalk Make You A Better Programmer?

Slashdot reader horrido shares an article that “has done more for Smalltalk advocacy than any other article in memory.” It was the second-most popular article of the year on the Hewlett Packard Enterprise site TechBeacon (recently passing 20,000 views), with…

Slashdot's 10 Most-Visited Stories of 2016

Slashdot's 10 Most-Visited Stories of 2016

Slashdot’s most-visited story of the year was “Microsoft Live Account Credentials Leaking From Windows 8 And Above,” which was visited more than 330,910 times since we published it August 16. And our second and third most popular stories came in…

Self-Driving Cars Will Make Organ Shortages Even Worse
Apple Patent Hints At Magnetic Ear Hooks To Keep Future AirPods In Your Ears
China Says It Will Shut Down Ivory Trade By End of 2017
How Russia Recruited Elite Hackers For Its Cyberwar

How Russia Recruited Elite Hackers For Its Cyberwar

Lasrick quotes a report from The New York Times (Warning: source may be paywalled; alternate source): For more than three years, rather than rely on military officers working out of isolated bunkers, Russian government recruiters have scouted a wide range…