mikejuk writes "Two former Facebook developers have created a new database that they say is the world's fastest and it is MySQL compatible. According to Eric Frenkiel and Nikita Shamgunov, MemSQL, the database they have developed over the past year, is thirty times faster than conventional disk-based databases. MemSQL has put together a video showing MySQL versus MemSQL carrying out a sequence of queries, in which MySQL performs at around 3,500 queries per second, while MemSQL achieves around 80,000 queries per second. The documentation says that MemSQL writes back to disk/SSD as soon as the transaction is acknowledged in memory, and that using a combination of write-ahead logging and snapshotting ensures your data is secure. There is a free version but so far how much a full version will cost isn't given." (See also this article at SlashBI.)
Catch up on stories from the past week (and beyond) at the Slashdot story archive
That Alan Turing committed suicide is widely accepted as fact. Now, an anonymous reader writes, "According to Professor Jack Copeland, director of the The Turing Archive for the History of Computing, 'The coroner [in Turing's case] didn't really investigate the evidence at all, he just jumped to the conclusion that he committed suicide. He seems to have been very biased from the statements in newspapers at the time.' Copeland further said that medical evidence suggested Turing died from inhaling cyanide rather than drinking or ingesting it."
wiredmikey writes "Using a combination of TCP scans and Google, security researchers found that nearly a quarter of the organizations running vulnerable versions of SAP are tempting fate by leaving them exposed to the Internet. This discovery, researchers from ERPScan say, dispels the myth that SAP systems are only available from the internal network, leading to the misconception that they are protected by design. By March 2012, there were more than 2,000 security advisories published by SAP. Of those, about 7% (124) have publicly available PoC (proof-of-concept) exploit code available to the public. Many of the issues discovered are related to poor configuration or poor deployment planning. For example, 212 SAP Routers were found in Germany, which were created mainly to route access to internal SAP systems. Another issue with the vulnerable and exposed SAP installations is that many of them run on Windows NT, creating a twin set of risks for the organization, as they have to contend with a bad SAP deployment and unsupported OS that is full of security issues all by itself."
An anonymous reader writes "Growing up in the digital age, 18 – 25s may appear to be a more tech-savvy generation, but that does not translate into safer computing and online practices. A new study reveals that they are the most at-risk group, and prone to cyber-attacks. That makes this group even more vulnerable to online security threats. Younger users tend to prioritize entertainment and community over security, perhaps due to overconfidence in their security knowledge. For example, they're more concerned about gaming or other social activities than their online security. They also have less sophisticated security software, and hence, have reported more security problems than other groups."
frisket writes with news from The Register about ongoing problems for some UK banks: "'RBS and Natwest have failed to register inbound payments for up to three days, customers have reported, leaving people unable to pay for bills, travel and even food. The banks — both owned by RBS Group — have confirmed that technical glitches have left bank accounts displaying the wrong balances and certain services unavailable. There is no fix date available.' Customers of NatWest subsidiary Ulster Bank in Ireland have also been left without banking services. RTE reports that 'the problem had arisen within the systems of parent bank RBOS when an incorrect patch was applied.'"
judgecorp writes "Iran has reported that its nuclear facilities are under a sustained cyber attack which it blames on the U.S., UK and Israel. America and Israel created Stuxnet, and have been accused of starting the Flame worm." And once a country admits that it's created such software, publicly deflecting such blame gets a lot harder.
Trailrunner7 writes "PayPal is the latest company to join the ranks of software vendors and Web properties that offer bounties to security researchers who privately disclose new bugs to them. The company isn't saying how much it will pay for each bug, just that its security team will determine the severity of each flaw as well as the ultimate payout. PayPal's decision to offer financial incentives to researchers follows the establishment of similar programs by companies including Google, Mozilla, Facebook, Barracuda and others. Google's bug bounty program may be the most well-known and comprehensive, as it includes bugs not just in its software products such as Chrome, but also its Web properties. The company has paid out more than $400,000 in rewards to researchers since the program began and researchers who consistently find bugs in Google's products can make a nice side income off the program."
An anonymous reader writes "I have two kids, 7 and 8. I would love to allow them internet access on a regular basis. The problem is what's out there: I really don't want them to deal with porn ads and such, but making either a blacklist or a whitelist myself would take months. So I figured I would ask you: what free software would you use with preferably prebuilt lists to protect your kids online? What is out there with fairly easy configuration ability (to allow for game servers — they love Minecraft), but secure enough they can't just bypass it using a Google search?"
hapworth writes "Eugene Kaspersky, founder and CEO of cybersecurity firm Kaspersky Lab, has warned that one of the greatest cyber threats facing the world is the lack of effective online voting systems, claiming that unless young people can vote online they won't bother at all and the whole democratic system will collapse. Not everyone is buying that theory, however (and there's reason to suspect Kaspersky has a vested interest in online voting, which may need his firm's cybersecurity products). As producer James Lambie writes, 'Ultimately, the digital native's disenchantment with voting is based less on a lack of suitable technology and more on disillusionment with the craven and anemic political choices they are presented with.'"
First time accepted submitter Burdell writes "A new startup has technology to read fingerprints from up to 6 meters away. IDair currently sells to the military, but they are beta testing it with a chain of 24-hour fitness centers that want to restrict sharing of access cards. IDair also wants to sell this to retail stores and credit card companies as a replacement for physical cards. Lee Tien from the EFF notes that the security of such fingerprint databases is a privacy concern." Since the last time this technology was mentioned more than a year ago, it seems that the claimed range for reading has tripled, and the fingerprint reader business has been spun off from the company at which development started.
sean_nestor writes "Back in October, an article appeared in The Wall Street Journal with the headline 'Why Companies Aren't Getting the Employees They Need.' It noted that even with millions of highly educated and highly trained workers sidelined by the worst economic downturn in three generations, companies were reporting shortages of skilled workers. Companies typically blame schools, for not providing the right training; the government, for not letting in enough skilled immigrants; and workers themselves, who all too often turn down good jobs at good wages. The author of the article, an expert on employment and management issues, concluded that although employers are in almost complete agreement about the skills gap, there was no actual evidence of it. Instead, he said, 'The real culprits are the employers themselves.'" The linked article is an interview with Peter Cappelli, author of the WSJ piece, who has recently published a book on the alleged skills gap.
chicksdaddy writes "Software failures were behind 24 percent of all the medical device recalls in 2011, according to data from the U.S. Food and Drug Administration's (FDA's) Office of Science and Engineering Laboratories (OSEL). The absence of solid architecture and 'principled engineering practices' in software development affects a wide range of medical devices, with potentially life-threatening consequences, the FDA warned. In response, FDA told Threatpost that it is developing tools to disassemble and test medical device software and locate security problems and weak design."
mask.of.sanity writes "An Android application capable of siphoning credit card data from contactless bank cards has appeared on the Google Play store. The app was developed by a security penetration tester for research purposes and will steal card numbers and expiry dates, along with transactions and merchant IDs. It requires a near field device capable phone, or accessory."
snydeq writes "Hacker group Rex Mundi has made good on its promise to publish thousands of loan-applicant records it swiped from AmeriCash Advance after the payday lender refused to fork over between $15,000 and $20,000 as an extortion fee — or, in Rex Mundi's terms, an 'idiot tax.' The group announced on June 15 that it was able to steal AmeriCash's customer data because the company had left a confidential page unsecured on one of its servers. 'This page allows its affiliates to see how many loan applicants they recruited and how much money they made,' according to the group's post on dpaste.com. 'Not only was this page unsecured, it was actually referenced in their robots.txt file.'"
McGruber writes "Jonathan Corbett, the subject of the earlier Slashdot Story: 'The Ineffectiveness of TSA Body Scanners,' has an update for us. His video showing him wandering through a nude body scanner with undetected objects is now complete with the feeds from TSA's security cameras at the checkpoint."