Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Quantum Researchers Achieve 10-Fold Boost In Superposition Stability ( 71

An anonymous reader quotes The Stack: A team of Australian researchers has developed a qubit offering ten times the stability of existing technologies. The computer scientists claim that the new innovation could significantly increase the reliability of quantum computing calculations... The new technology, developed at the University of New South Wales, has been named a 'dressed' quantum bit as it combines a single atom with an electromagnetic field. This process allows the qubit to remain in a superposition state for ten times longer than has previously been achieved. The researchers argue that this extra time in superposition could boost the performance stability of quantum computing calculations... Previously fragile and short-lived, retaining a state of superposition has been one of the major barriers to the development of quantum computing. The ability to remain in two states simultaneously is the key to scaling and strengthening the technology further.
Do you ever wonder what the world will look like when everyone has their own personal quantum computer?

Nurses In Australia Face Punishment For Promoting Anti-Vaccination Messages Via Social Media ( 570 writes: Medical Express reports that nurses and midwives promoting anti-vaccination messages in Australia could face punishment including being slapped with a caution and having their ability to practice medicine restricted. Serious cases could be referred to an industry tribunal, where practitioners could face harsher penalties such as having their registration suspended or cancelled. The Nursing and Midwifery Board of Australia released the vaccination standards in response to what it described as a small number of nurses and midwives promoting anti-vaccination via social media. The statement also urges members of the public to report nurses or midwives promoting anti-vaccination. Promoting false, misleading or deceptive information is an offense under national law and is prosecutable by the Australian Health Practitioner Regulation Agency. "The board will consider whether the nurse or midwife has breached their professional obligations and will treat these matters seriously," the statement said. However Dr. Hannah Dahlen, a professor of midwifery at the University of Western Sydney and the spokeswoman for the Australian College of Midwives, worries the crackdown may push people with anti-vaccination views further underground. "The worry is the confirmation bias that can occur, because people might say: 'There you go, this is proof that you can't even have an alternative opinion.' It might in fact just give people more fuel for their belief systems."
The Almighty Buck

Apple is 'Intransigent, Closed and Controlling' Say Banks ( 283

Apple is increasingly trying to get banks to implement its Apple Pay mobile payments solutions, but some banks are avoiding Cupertino giant's offer, saying that the company is "closed and controlling". From a report on Financial Review: Three of Australia's big four banks have described technology giant Apple as being "intransigent, closed and controlling" and accused it of attempting to freeload on their contactless payments infrastructure while slowing innovation in digital wallets. In an increasingly acrimonious dispute, Commonwealth Bank of Australia, National Australia Bank, Westpac Banking Corp and Bendigo and Adelaide Bank are arguing that the engineering of Apple iPhones prevent them from delivering mobile wallets to millions of customers. This is because Apple Pay is the only application that works with the iPhone's "near field communication" (NFC) antenna, which communicates with payment terminals. In their latest, 137-page submission filed with the competition regulator, the banks argue that by locking them out, "Apple is seeking for itself the exclusive use of Australia's existing NFC terminal infrastructure for the making of integrated mobile payments using iOS devices. Yet, this infrastructure was built and paid for by Australian banks and merchants for the benefit of all Australians."
United States

Samsung is Setting Up Note 7 Exchange Booths at Airports Around the World ( 46

An anonymous reader writes: Samsung is setting up Galaxy Note 7 exchange booths in airports around the world, hoping to stop customers taking the dangerous device onto flights at the last minute. The first of these new "customer service points" appear to have been introduced in South Korean airports, but Samsung has confirmed the booths are opening in airports across Australia, with reports of the desks appearing in the US as well. The booths are located in "high-traffic terminals" before security screening, says Samsung, and allow Note 7 owners to swap their phone for an unspecified exchange device. According to a report from ABC7News in San Francisco -- where a Samsung exchange desk has appeared at the city's international airport -- employees for the tech company are on hand to help customers transfer their data onto a new phone.

Apple To Obsolete iPhone 4 and Late 2010 MacBook Air On October 31 ( 114

Apple will make all iPhone 4 models, the late 2010 13-inch MacBook Air, third-generation AirPort Extreme, and mid-2009 AirPort Time Capsule obsolete come October 31, MacRumor claims, citing a different report. From the report: Apple products on the vintage and obsolete list are no longer eligible for hardware service, beyond a few exceptions. Apple defines vintage products as those that have not been manufactured for more than five years but less than seven years ago, while obsolete products are those that were discontinued more than seven years ago. Each of the products added were released between 2009 and 2010. The report specifically pertains to Apple's vintage and obsolete products list in Japan, but the new additions will more than likely extend to the United States, Australia, Canada, and the rest of the Asia-Pacific and Europe regions.

Second Hacker Group Targets SWIFT Users, Symantec Warns ( 15

A second hacking group has sought to rob banks using fraudulent SWIFT messages, cyber security firm Symantec said on Tuesday. The group is said to be using the same approach that resulted in $81 million in the high-profile February attack on Bangladesh's central bank. From a Reuters report: Symantec said that a group dubbed Odinaff has infected 10 to 20 Symantec customers with malware that can be used to hide fraudulent transfer requests made over SWIFT, the messaging system that is a lynchpin of the global financial system. Symantec's research provided new insight into ongoing hacking that has previously been disclosed by SWIFT. SWIFT Chief Executive Gottfried Leibbrandt last month told customers about three hacks and warned that cyber attacks on banks are poised to rise. SWIFT and Symantec have not identified specific victims beyond Bangladesh Bank. Symantec said that most Odinaff attacks occurred in the United States, Hong Kong, Australia, the United Kingdom and Ukraine.

Facebook Launches Marketplace On App, Takes On eBay and Craigslist ( 38

Facebook today also announced the launch of "Marketplace," allowing users to buy and sell items on the social media platform. The company says more than 450 million people already visit buying and selling groups on Facebook each month. The new service will be available to people over 18 years of age in the United States, the UK, Australia, and New Zealand on Facebook's iPhone and Android over the coming days. BetaNews adds: The primary aim of Facebook Marketplace is to keep things as simple as possible. Both listing and searching for items is incredibly easy, and the focus is on putting would-be buyers in contact with sellers as close by as possible. The new feature sits alongside the many existing pages that have been set up to facilitate the buying and selling of goods, and Facebook has made it possible to post items to the Marketplace and individual pages simultaneously to help maximize your audience.

The Psychological Reasons Behind Risky Password Practices ( 210

Orome1 quotes a report from Help Net Security: Despite high-profile, large-scale data breaches dominating the news cycle -- and repeated recommendations from experts to use strong passwords -- consumers have yet to adjust their own behavior when it comes to password reuse. A global Lab42 survey, which polled consumers across the United States, Germany, France, New Zealand, Australia and the United Kingdom, highlights the psychology around why consumers develop poor password habits despite understanding the obvious risk, and suggests that there is a level of cognitive dissonance around our online habits. When it comes to online security, personality type does not inform behavior, but it does reveal how consumers rationalize poor password habits. My personal favorite: password paradox. "The survey revealed that the majority of respondents understand that their digital behavior puts them at risk, but do not make efforts to change it," reports Help Net Security. "Only five percent of respondents didn't know the characteristics of a secure password, with the majority of respondents understanding that passwords should contain uppercase and lowercase letters, numbers and symbols. Furthermore, 91 percent of respondents said that there is inherent risk associated with reusing passwords, yet 61 percent continue to use the same or similar passwords anyway, with more than half (55 percent) doing so while fully understanding the risk." The report also found that when attempting to create secure passwords, "47 percent of respondents included family names or initials," while "42 percent contain significant dates or numbers and 26 percent use the family pet."

Data Entry Blunders Force Air Asia Pilots To Land in Melbourne Instead of Malaysia ( 84

A flight from Sydney to Malaysia ended up in Melbourne after the captain incorrectly entered the plane's location in its navigation system just before take-off, according to a safety investigation, whose conclusion was published this week. Mashable reports:The Air Asia pilots made several errors in entering data into the aircraft's navigation system, which caused them to follow an incorrect flight path out of Sydney, according to Australian transportation officials. While troubleshooting the incorrect flight path, the pilots were unable to fix the issue, and may have compounded it. The aircraft's systems would not allow the plane to be flown in instrument conditions and the weather also had deteriorated in Sydney by the time the pilots decided to turn back. They were directed via radar to a visual approach in Melbourne where they could land safely. The pilots did not believe the airport was located in Malaysia.

Australian Airlines Ban Use of Samsung Galaxy Note 7 Phones After Battery Fires ( 67

Less than a week after FAA said it was thinking about banning the Samsung Galaxy Note 7 from flights, three Australian airlines announced that it would ban passengers from using or charging Note 7 smartphones during flights. The announcement comes a week after Samsung announced that it was banning the sales of its new flagship smartphone over nearly three-dozen phones exploded worldwide. Reuters reports: Qantas, its budget unit Jetstar and Virgin Australia said they had not been directed to ban the use of the phone by aviation authorities, but did so as a precaution following Samsung's recall of the phones in 10 markets. Although customers will still be able to bring the phones on flights, the ban extends to the phones being plugged in to flight entertainment systems where USB ports are available. The recall follows reports of the 988,900 won ($885) phone igniting while charging -- an embarrassing blow to Samsung, which prides itself on its manufacturing prowess and had been banking on the devices to add momentum to a recovery in its mobile business. Samsung, the world's biggest smartphone vendor, has sold 2.5 million of the premium devices so far. "Following Samsung Australia's recall of the Samsung Galaxy Note 7 personal electronic device we are requesting that passengers who own them do not switch on or charge them in flight," a Qantas spokesman said in an emailed statement.

Staff Breach At OneLogin Exposes Password Storage Feature ( 47

River Tam quotes a report from CSO Australia: Enterprise access management firm OneLogin has suffered an embarrassing breach tied to a single employee's credentials being compromised. OneLogin on Tuesday revealed the breach affected a feature called Secure Notes that allowed its users to "store information." That feature however is pitched to users as a secure way to digitally jot down credentials for access to corporate firewalls and keys to software product licenses. The firm is concerned Secure Notes was exposed to a hacker for at least one month, though it may have been from as early as July 2 through to August 25, according to a post by the firm. Normally these notes should have been encrypted using "multiple levels of AES-256 encryption," it said in a blog post. Several thousand enterprise customers, including high profile tech startups, use OneLogin for single sign-on to access enterprise cloud applications. The company has championed the SAML standard for single sign-on and promises customers an easy way to enable multi-factor authentication from devices to cloud applications. But it appears the company wasn't using multi-factor authentication for its own systems. OneLogin's CISO Alvaro Hoyos said a bug in its software caused Secure Notes to be "visible in our logging system prior to being encrypted and stored in our database." The firm later found out that an employees compromised credentials were used to access this logging system. The company has since fixed the bug on the same day it detected the bug. CSO adds that the firm "also implemented SAML-based authentication for its log management system and restricted access to a limited set of IP addresses."

Microsoft Lost a City Because They Used Wikipedia Data ( 109

"Microsoft can't tell North from South on Bing Maps," joked The Register, reporting that Microsoft's site had "misplaced Melbourne, the four-million-inhabitant capital of the Australian State of Victoria." Long-time Slashdot reader RockDoctor writes: Though they're trying to minimise it, the recent relocation of Melbourne Australia to the ocean east of Japan in Microsoft's flagship mapping application is blamed on someone having flipped a sign in the latitude given for the city's Wikipedia page. Which may or may not be true. But the simple stupidity of using a globally-editable data source for feeding a mapping and navigation system is ... "awesome" is (for once) an appropriate word.

Well, it's Bing, so at least no-one was actually using it.

"Bing's not alone in finding Australia hard to navigate," reports The Register. "In 2012 police warned not to use Apple Maps as it directed those seeking the rural Victorian town of Mildura into the middle of a desert."
Social Networks

'Social Media ID, Please?' Proposed US Law Greeted With Anger ( 220

The U.S. government announced plans to require some foreign travelers to provide their social media account names when entering the country -- and in June requested comments. Now the plan is being called "ludicrous," an "all-around bad idea," "blatant overreach," "desperate, paranoid heavy-handedness," "preposterous," "appalling," and "un-American," reports Slashdot reader dcblogs: That's just a sampling of the outrage. Some 800 responded to the U.S. request for comments about a proposed rule affecting people traveling from "visa waiver" countries to the U.S., where a visa is not required. This includes most of Europe, Singapore, Chile, Japan, South Korea, Australia and New Zealand... In a little twist of irony, some critics said U.S. President Obama's proposal for foreign travelers is so bad, it must have been hatched by Donald Trump.
"Travelers will be asked to provide their Twitter, Facebook, Instagram, LinkedIn, Google+, and whatever other social ID you can imagine to U.S. authorities," reports Computer World. "It's technically an 'optional' request, but since it's the government asking, critics believe travelers will fear consequences if they ignore it..."

US Patients Battle EpiPen Prices And Regulations By Shopping Online ( 396

"The incredible increase in the cost of EpiPens, auto-injectors that can stop life-threatening emergencies caused by allergic reactions, has hit home on Capitol Hill," reports CNN. Slashdot reader Applehu Akbar reports that the argument "has now turned into civil war in the US Senate": One senator's daughter relies on Epi-Pen, while another senator's daughter is CEO of Mylan, the single company that is licensed to sell these injectors in the US. On the worldwide market there is no monopoly on these devices... Is it finally time to allow Americans to go online and fill their prescriptions on the world market?
Time reports some patients are ordering cheaper EpiPens from Canada and other countries online, "an act that the FDA says is technically illegal and potentially dangerous." But the FDA also has "a backlog of about 4,000 generic drugs" awaiting FDA approval, reports PRI, noting that in the meantime prices have also increased for drugs treating cancer, hepatitis C, and high cholesterol. In Australia, where the drug costs just $38, one news outlet reports that the U.S. "is the only developed nation on Earth which allows pharmaceutical companies to set their own prices."

Robot Babies Not Effective Birth Control, Australian Study Finds ( 323

An anonymous reader writes: Girls given imitation babies to look after in an effort to deter teenage pregnancy could actually be more likely to get pregnant, according to a study. Researchers in Australia found 8% of girls who used the dolls were expecting by the age of 20, compared with 4% of those who did not. The number of girls having at least one abortion was also higher among girls given the dolls: 9% compared to 6%. 'Baby Think It Over' dolls were used in a Virtual Infant Parenting (VIP) programme which began in 57 schools in Western Australia in 2003. During the three-year study, published in The Lancet, 1267 girls aged 13 to 15 used the simulators -- which need to be fed and changed, while 1567 learned the normal health curriculum. The idea originated in the United States and is used in 89 countries. Researchers from the Telethon Kids Institute in Western Australia are now warning that such programmes may be a waste of public money.

Facebook Is Testing Autoplaying Video With Sound ( 152

An anonymous reader writes: Facebook is testing a "feature" that autoplays video clips on your feed with sound. It's not a very big test, but there's a possibility the company could roll it out to a larger group of users. The Next Web reports: "The company is currently trying two methods of getting people to watch video with sound in Australia: the aforementioned autoplaying, and an unmute button on the lower right corner of videos, like Vine videos on a desktop. The latter certainly sounds more reasonable; the last thing you want is to be checking Facebook quickly during a meeting or class, and suddenly have your phone blaring out an advert because you happened to stop on a video. Thankfully, you can disable the 'feature' from your settings, but the point is there's nothing wrong with the current opt-in approach, especially considering how many companies are embracing video captioning, and that Facebook even has its own auto-caption tool for advertisers." "We're running a small test in News Feed where people can choose whether they want to watch videos with sound on from the start," a Facebook spokesperson told Mashable Australia. "For people in this test who do not want sound to play, they can switch it off in Settings or directly on the video itself. This is one of several tests we're running as we work to improve the video experience for people on Facebook."

Ashley Madison Security Protocols Violated Canada, Austrialia Privacy Laws ( 29

The Office of the Privacy Commissioner of Canada said Tuesday that the Canada-based online dating and social networking service Ashely Madison used inadequate privacy and security technology while marketing itself as a discreet and secure way for consenting adults to have affairs. reports: "In a report Tuesday, the privacy watchdog says the Toronto-based company violated numerous privacy laws in Canada and abroad in the era before a massive data breach exposed confidential information from their clients to hackers. The hack stole correspondence, identifying details and even credit card information from millions of the site's users. The resulting scandal cost the company about a quarter of its annual revenues from irate customers who demanded refunds and cancelled their accounts. Working with a similar agency in Australia, the privacy group says the company knew that its security protocols were lacking but didn't do enough to guard against being hacked. The company even adorned its website with the logo of a 'trusted security award' -- a claim the company admits it fabricated." The report found that "poor habits such as inadequate authentication processes and sub-par key and password management practices were rampant at the company" and that "much of the company's efforts to monitor its own security were 'focused on detecting system performance issues and unusual employee requests for decryption of sensitive user data.'" What's more is that Ashley Madison continued to store personal information of its users even after some of which had deleted or deactivated their account(s). These people then had their information included in databases published online after the hack.

How SSL/TLS Encryption Hides Malware ( 87

Around 65% of the internet's one zettabyte of global traffic uses SSL/TLS encryption -- but Slashdot reader River Tam shares an article recalling last August when 910 million web browsers were potentially exposed to malware hidden in a Yahoo ad that was hidden from firewalls by SSL/TLS encryption: When victims don't have the right protection measures in place, attackers can cipher command and control communications and malicious code to evade intrusion prevention systems and anti-malware inspection systems. In effect, the SSL/TLS encryption serves as a tunnel to hide malware as it can pass through firewalls and into organizations' networks undetected if the right safeguards aren't in place. As SSL/TLS usage grows, the appeal of this threat vector for hackers too increases.

Companies can stop SSL/TLS attacks, however most don't have their existing security features properly enabled to do so. Legacy network security solutions typically don't have the features needed to inspect SSL/TLS-encrypted traffic. The ones that do, often suffer from such extreme performance issues when inspecting traffic, that most companies with legacy solutions abandon SSL/TLS inspection.


Australian Authorities Hacked Computers in the US ( 75

Motherboard is reporting that Australian authorities hacked Tor users in the United States as part of a child pornography investigation. The revelation comes through recently-filed US court documents. The incident underscores a trend where law enforcement around the world are increasingly pursuing targets overseas using hacking tools, raising legal questions around agencies' reach. From the report: In one case, Australian authorities remotely hacked a computer in Michigan to obtain the suspect's IP address. "The Love Zone" was a prolific dark web child abuse site, where users were instructed to upload material at least once a month to maintain access to the forum. By July 2014, the site had over 29,000 members, according to US court documents, constituting what the US Department of Justice described as a "technologically sophisticated conspiracy." In 2014, Queensland Police Service's Task Force Argos, a small, specialised unit focused on combating child exploitation crimes, identified the site's Australian administrator in part because of a localized greeting he signed messages with. The unit quietly took over his account, and for months ran the site in an undercover capacity, posing as its owner. Task Force Argos' logo includes a scorpion, and the tagline "Leave No Stone Unturned." Because The Love Zone was based on the dark web, users typically connected via the Tor network, masking their IP addresses even from the law enforcement agents who were secretly in control of the site. Task Force Argos could see what the users were viewing, and what pages they were visiting, but not where they were really connecting from.

Slashdot Top Deals