slashdot.org
- Posted on Thursday January 01, 1970
 Cybercriminals have been increasingly turning to "residential proxy" services over the past two to three years to disguise malicious web traffic as everyday online activity, according to research presented at the Sleuthcon cybercrime conference. The shift represents a response to law enforcement's growing success in targeting traditional "bulletproof" hosting services, which previously allowed criminals to maintain anonymous web infrastructure.
Residential proxies route traffic through decentralized networks running on consumer devices like old Android phones and low-end laptops, providing real IP addresses assigned to homes and offices. This approach makes malicious activity extremely difficult to detect because it appears to originate from trusted consumer locations rather than suspicious server farms. The technology creates particular challenges when attackers appear to come from the same residential IP ranges as employees of target organizations.
Read more of this story at Slashdot. Continue Reading » - Posted on Thursday January 01, 1970
 Britain is moving toward major nuclear power commitments after years of delays, as government officials acknowledge they can no longer postpone critical energy infrastructure decisions. The U.K. Treasury has exhausted options for delaying nuclear power choices, Politico reported this week, citing sources within Whitehall and the nuclear industry.
The urgency stems from Britain's aging nuclear infrastructure, where five power plants currently supply 15% of the country's total energy needs but face shutdown by 2030. This timeline has created significant pressure on policymakers to secure replacement capacity or risk substantial gaps in the nation's electricity supply.
Read more of this story at Slashdot. Continue Reading » - Posted on Thursday January 01, 1970
 Startup Nord Quantique has demonstrated that a single piece of hardware can host an error-detecting logical qubit by using two quantum frequencies within one resonator. The breakthrough has the potential to slash the hardware demands for quantum error correction and deliver more compact and efficient quantum computing architectures. Ars Technica reports: The company did two experiments with this new hardware. First, it ran multiple rounds of error detection on data stored in the logical qubit, essentially testing its ability to act like a quantum memory and retain the information stored there. Without correcting errors, the system rapidly decayed, with an error probability in each round of measurement of about 12 percent. By the time the system reached the 25th measurement, almost every instance had already encountered an error. The second time through, the company repeated the process, discarding any instances in which an error occurred. In almost every instance, that ... Continue Reading » - Posted on Thursday January 01, 1970
 Apple has urged Australia not to follow the European Union in mandating iPhone app sideloading, warning that such policies pose serious privacy and security risks. "This communication comes as the Australian federal government considers new rules that could force Apple to open up its iOS ecosystem, much like what happened in Europe with recent legislation," notes Neowin. Apple claims that allowing alternative app stores has led to increased exposure to malware, scams, and harmful content. From the report: Apple, in its response to this Australian paper (PDF), stated that Australia should not use the EU's Digital Markets Act "as a blueprint". The company's core argument is that the changes mandated by the EU's DMA, which came into full effect in March 2024, introduce serious security and privacy risks for users. Apple claims that allowing sideloading and alternative app stores effectively opens the door for malware, fraud, scams, and other harmful ... Continue Reading » - Posted on Thursday January 01, 1970
 An anonymous reader quotes a report from Ars Technica: In 2019, we told you about a new interactive digital "murder map" of London compiled by University of Cambridge criminologist Manuel Eisner. Drawing on data catalogued in the city coroners' rolls, the map showed the approximate location of 142 homicide cases in late medieval London. The Medieval Murder Maps project has since expanded to include maps of York and Oxford homicides, as well as podcast episodes focusing on individual cases. It's easy to lose oneself down the rabbit hole of medieval murder for hours, filtering the killings by year, choice of weapon, and location. Think of it as a kind of 14th-century version of Clue: It was the noblewoman's hired assassins armed with daggers in the streets of Cheapside near St. Paul's Cathedral. And that's just the juiciest of the various cases described in a new paper published in the journal ... Continue Reading » - Posted on Thursday January 01, 1970
 Physicists at Loughborough University have created what they believe is the world's smallest violin, measuring just 35 microns long and 13 microns wide -- smaller than the width of a human hair, which typically ranges from 17 to 180 microns in diameter. The microscopic instrument, created using the university's new nanolithography system, serves as a demonstration of precision manufacturing capabilities that researchers will apply to studies of computing efficiency and energy harvesting methods.
The team used a NanoFrazor machine employing thermal scanning probe lithography, where a heated needle-like tip etches highly precise patterns at the nanoscale onto a chip coated with gel-like resist material. While the individual violin takes roughly three hours to produce, the research team spent several months refining their techniques to achieve the final result, which exists as a microscopic image rather than a playable instrument.
Read more of this story at Slashdot. Continue Reading » - Posted on Thursday January 01, 1970
 Longtime Slashdot reader sinij shares a report from Car and Driver: [Volvo] is debuting a new version of the three-point seatbelt that it believes is a major improvement over the original. The new design will be a smart belt that adapts to each occupant's body and adjusts the belt load accordingly. It uses data from interior and exterior sensors to customize protection based on the road conditions and the specific occupants. The technology will debut on the upcoming EX60 crossover.
According to Volvo, the onboard sensors can accurately detect a passenger's height, weight, body shape, and seating position. Based on real-time data, the belts optimize protection -- increasing belt load for larger passengers or lowering it for smaller passengers. While the technology for customizing protection isn't new -- Volvo's current belts already use three load-limiting profiles- the new belts increase that number to 11. The belts should also get safer ... Continue Reading » - Posted on Thursday January 01, 1970
 The Register's Thomas Claburn reports: The Linux Foundation on Friday introduced a new method to distribute WordPress updates and plugins that's not controlled by any one party, in a bid to "stabilize the WordPress ecosystem" after months of infighting. The FAIR Package Manager project is a response to the legal brawl that erupted last year, pitting WordPress co-creator Matthew Mullenweg, his for-profit hosting firm Automattic, and the WordPress Foundation that he controls, against WP Engine, a rival commercial WordPress hosting firm. [...]
The Linux Foundation says the FAIR Package Manager, a mechanism for distributing open-source WordPress plugins, "eliminates reliance on any single source for core updates, plugins, themes, and more, unites a fragmented ecosystem by bringing together plugins from any source, and builds security into the supply chain." In other words, it can't be weaponized against the WordPress community because it won't be controlled by any one entity. "The FAIR ... Continue Reading » - Posted on Thursday January 01, 1970
 Apple's Worldwide Developers Conference 25 (WWDC) kicks off next week, June 9th, showcasing the company's latest software and new technologies. That includes the next version of iOS, which is rumored to have the most significant design overhaul since the introduction of iOS 7. Here's an overview of what to expect:
Major Software Redesigns
Apple plans to shift its operating system naming to reflect the release year, moving from sequential numbers to year-based identifiers. Consequently, the upcoming releases will be labeled as iOS 26, macOS 26, watchOS 26, etc., streamlining the versioning across platforms.
iOS 26 is anticipated to feature a glossy, glass-like interface inspired by visionOS, incorporating translucent elements and rounded buttons. This design language is expected to extend across iPadOS, macOS, watchOS, and tvOS, promoting a cohesive user experience across devices. Core applications like Phone, Safari, and Camera are slated for significant redesigns, too. For instance, Safari may introduce ... Continue Reading » - Posted on Thursday January 01, 1970
 An anonymous reader quotes a report from OregonLive: Together, the four founders of Beaverton startup AheadComputing spent nearly a century at Intel. They were among Intel's top chip architects, working years in advance to develop new generations of microprocessors to power the computers of the future. Now they're on their own, flying without a net, building a new class of microprocessor on an entirely different architecture from Intel's. Founded a year ago, AheadComputing is trying to prove there's a better way to design computer chips.
"AheadComputing is doing the biggest, baddest CPU in the world," said Debbie Marr, the company's CEO. [...] AheadComputing is betting on an open architecture called RISC-V -- RISC stands for "reduced instruction set computer." The idea is to craft a streamlined microprocessor that works more efficiently by doing fewer things, and doing them better than conventional processors. For AheadComputing's founders and 80 employees, many of ... Continue Reading » - Posted on Thursday January 01, 1970
 alternative_right shares a report: New York state lawmakers voted to stop the NYPD's attempt to block its radio communications from the public Thursday, with the bill expected to head to Gov. Kathy Hochul's desk. The "Keep Police Radio Public Act" passed both the state Senate and state Assembly, with a sponsor of the legislation arguing the proposal strikes the "proper balance" in the battle between transparency and sensitive information.
"Preserving access to police radio is critical for a free press and to preserve the freedoms and protections afforded by the public availability of this information," state Sen. Michael Gianaris (D-Queens) said in a statement. "As encrypted radio usage grows, my proposal strikes the proper balance between legitimate law enforcement needs and the rights and interests of New Yorkers."
The bill, which was sponsored in the Assembly by lawmaker Karines Reyes (D-Bronx), is meant to make real-time police radio communications accessible ... Continue Reading » - Posted on Thursday January 01, 1970
 Mirnotoriety shares a report from the Independent: Downing Street is exploring a proposal to introduce digital ID cards for every adult in Britain in a move to tackle the UK's illegal migration crisis, according to reports. The new "BritCard" would be used to check on an individual's right to live and work in Britain, with senior No 10 figures examining the proposal, The Times has reported.
The card, stored on a smartphone, would reportedly be linked to government records and could check entitlements to benefits and monitor welfare fraud. [...] ... it would cost up to 400 million pounds to build the system and around 10 million pounds a year to administer as a free-to-use phone app.
Read more of this story at Slashdot. Continue Reading » - Posted on Thursday January 01, 1970
 An anonymous reader quotes a report from BleepingComputer: The FBI is warning that the BADBOX 2.0 malware campaign has infected over 1 million home Internet-connected devices, converting consumer electronics into residential proxies that are used for malicious activity. The BADBOX botnet is commonly found on Chinese Android-based smart TVs, streaming boxes, projectors, tablets, and other Internet of Things (IoT) devices. "The BADBOX 2.0 botnet consists of millions of infected devices and maintains numerous backdoors to proxy services that cyber criminal actors exploit by either selling or providing free access to compromised home networks to be used for various criminal activity," warns the FBI.
These devices come preloaded with the BADBOX 2.0 malware botnet or become infected after installing firmware updates and through malicious Android applications that sneak onto Google Play and third-party app stores. "Cyber criminals gain unauthorized access to home networks by either configuring the product with malicious software ... Continue Reading » - Posted on Thursday January 01, 1970
 Chinese student enrollment at American universities has dropped to 277,000 in the 2023-24 academic year, down from a peak of 372,000 in 2019-20, according to data in a new report examining shifting global education patterns. The decline accelerated following the State Department's May 28th announcement of an "aggressive" campaign to revoke visas for Chinese students in "critical fields" of science and engineering, as well as those with unspecified Communist Party "connections."
The trend reflects broader economic and geopolitical pressures beyond visa restrictions. Chinese families increasingly view American education as too expensive amid China's economic downturn and property market decline, while domestic employers have grown suspicious of foreign-educated graduates. Meanwhile, Chinese students are choosing alternatives including Britain, which hosted nearly 150,000 Chinese students in 2023-24, and regional destinations like Japan, where Chinese enrollment increased to 115,000 in 2023 from under 100,000 in 2019.
Read more of this story at Slashdot. Continue Reading » - Posted on Thursday January 01, 1970
 Apple will lose the ability to collect commissions on external iOS purchases in Europe starting June 23, following a European Commission ruling that hinges on the grammatical interpretation of a single comma in the Digital Markets Act. The dispute centers on Article 5.4, which requires gatekeepers to allow business users "free of charge, to communicate and promote offers, including under different conditions [...], and to conclude contracts with those end users."
Apple contends that "free of charge" applies only to communication and promotion activities, not contract conclusion, allowing the company to maintain its commission structure on external transactions. The European Commission interprets the comma before "and to conclude contracts" as creating an enumeration where the free-of-charge requirement applies to all listed activities, including purchases made outside Apple's payment system.
Under the new ruling, Apple can collect commissions only on the first external transaction between users and developers, with all subsequent ... Continue Reading »
|