news aggregator

How Uber Is Changing Life For Women In Saudi Arabia

Slashdot - Mon, 2015-08-10 14:24
An anonymous reader writes: Being unable to legally drive is hard for many women in Saudi Arabia, especially working women. With notoriously poor mass transit options, and the stigma attached to women riding the bus alone, Uber has changed the life of many Saudi women by giving them greater mobility and independence. While there are no official statistics on how many women use the service, anecdotal evidence suggest that 70% to 90% of Saudi riders are women. "A lot of them, I would say, are young women," says Saudi Arabia general manager Majed Abukhater. "We have some data to show that these women are starting to rely on Uber a lot more for their daily commutes; the proportion of trips that we see in Saudi during the weekday is actually very high relative to other locations. That's just kind of one indicator to tell us that women are really starting to rely on Uber for their daily commutes to work, or to school, or to university."

Read more of this story at Slashdot.

Categories: news

Finjan, Cisco, JDate and Other Companies Acting Like Patent Trolls; New Threats to Linux

Linux Today - Mon, 2015-08-10 14:00

techrights: News about patents from all across the Web, placing special emphasis on software patents and how these affect Free software projects, including Linux and Android

Categories: linux, news, open source

Fed 'close' to hiking rates, U.S. economy near normal: Lockhart

Reuters: Technology - Mon, 2015-08-10 13:55
ATLANTA (Reuters) - Economic conditions in the United States have largely returned to normal and a Federal Reserve decision to raise interest rates should come soon, Atlanta Fed President Dennis Lockhart said on Monday.

Categories: news

At least 31 people killed in two bomb attacks in eastern Iraq - security sources

Reuters: Technology - Mon, 2015-08-10 13:39
BAGHDAD (Reuters) - At least 24 people were killed and 55 others wounded near the eastern Iraqi city of Baquba when a car bomb exploded in a marketplace on Monday, security and medical sources said.
Categories: news

Ask Slashdot: Capacity Planning and Performance Management?

Slashdot - Mon, 2015-08-10 13:39
An anonymous reader writes: When shops mostly ran on mainframes, it was relatively easy to do capacity planning because systems and programs were mostly monolithic. But today is very different; we use a plethora of technologies and systems are more distributed. Many applications are decentralized, running on multiple servers either for redundancy or because of multi-tiering architecture. Some companies run legacy systems alongside bleeding-edge technologies. We're also seeing many innovations in storage, like compression, deduplication, clones, snapshots, etc. Today, with many projects, the complexity make it pretty difficult to foresee resource usage. This makes it hard to budget for hardware that can fulfill capacity and performance requirements in the long term. It's even tougher when the project is still in the planning stages. My question: how do you do capacity planning and performance management for such decentralized systems with diverse technologies? Who is responsible for capacity planning in your company? Are you mostly reactive in adding resources (CPU, memory, IO, storage, etc) or are you able to plan it out well beforehand?

Read more of this story at Slashdot.

Categories: news

Chicago public schools to lay off 1,500 teachers and staff

Reuters: Technology - Mon, 2015-08-10 13:37
CHICAGO (Reuters) - Chicago Public Schools on Monday began notifying nearly 1,500 teachers and support staff who are being fired amid a previously announced, $200 million budget cut and a shift in student enrollment.
Categories: news

Texas man accused of killing eight formally charged in Houston court

Reuters: Technology - Mon, 2015-08-10 13:35
(Reuters) - The Texas man accused of killing eight people, including his son and an ex-girlfriend, during the weekend in a Houston-area home was formally charged on Monday with three counts of capital murder, a crime punishable by death.

Categories: news

Problems with Ubuntu's Software Center and How Canonical Plans to Fix Them

Linux Journal - Mon, 2015-08-10 13:01

Ubuntu has received a lot of flack from the community for some of its commercial projects. Placing Amazon ads in Unity's Dash is a classic example of a poorly planned move that flies in the teeth of the community's ethos. A community built on the concepts of freedom and software that empowers the user (instead of some commercial concern) would never take that well. more>>

Categories: linux, news, open source

Check Point: Certifi-Gate-based attacks could take complete control of Android devices

Linux Today - Mon, 2015-08-10 13:00

 ZDnet: Check Point has discovered a serious security hole with mobile remote support tools commonly used by hundreds of millions of Android devices.

Categories: linux, news, open source

Manipulating Microsoft WSUS To Attack Enterprises

Slashdot - Mon, 2015-08-10 12:57
msm1267 writes: Microsoft's enterprise-grade Windows Server Update Services (WSUS), used to download and distribute security and driver updates, poses a significant weak spot if not configured properly. Researchers Paul Stone and Alex Chapman during last week's Black Hat conference presented research (PDF) on the the WSUS attack surface and discovered that when a WSUS server contacts Microsoft for driver updates, it does so using XML SOAP web services, and those checks are not made over SSL. While updates are signed by Microsoft and updates must be verified by Microsoft, Stone and Chapman discovered that an attacker already in a man-in-the-middle position on a corporate network, for example, could, with some work, tamper with the unencrypted communication and inject a malicious homegrown update.

Read more of this story at Slashdot.

Categories: news

#NoHacked: Using two-factor authentication to protect your site

Google Webmaster Central Blog - Mon, 2015-08-10 12:53
Today in our #nohacked campaign, we’ll be talking about two-factor authentication. Follow along with discussions on Twitter and Google+ using the #NoHacked tag. (Part 1, Part 2)
There was once a time when having a relatively strong password or answering a security question was a reasonable way to protect your online accounts. However, according to a study from Stop Badware, stolen credentials is a common way for hackers to compromise websites. Additionally, even reputable sites can fall victim to hacking, potentially exposing your personal data like passwords to attackers.

Fortunately, two-factor authentication can help you keep your accounts safer. Two-factor authentication relies on an additional source of verification, in conjunction with your password, to access your account. You might have used two-factor authentication before if you have ever been prompted for a code from your phone when logging into a social media site or from a chip card reader when logging into a bank account. Two-factor authentication makes it more difficult for someone to log into your account even if they have stolen your password.

As a website owner, you should enable two-factor authentication on your accounts where possible. A compromised account can cause you to lose important personal data and valuable reputation for your site. Two-factor authentication can give you the ease of mind that your accounts and data are safer. 

Google currently offers 2-Step Verification for all of its accounts, including accounts from Google Apps domains. You can use your phone, a hardware token like a Security Key, or the Google Authenticator app to verify your account. These options give you flexibility when traveling or when you don’t have access to the mobile network.

If your hosting provider, Content Management System (CMS), or any type of platform you use for managing your site doesn’t offer two-factor authentication, ask their customer support for an option to use two-factor authentication in the future.They can build two-factor authentication into their own platforms using Google’s open source code. If your platform or hoster doesn’t provide strong protection against unauthorized access consider hosting your content elsewhere. You can see a list of websites that support two-factor authentication, including what types of authentication options they offer, at

If you have any additional questions, you can post in the Webmaster Help Forums where a community of webmasters can help answer your questions. You can also join our Hangout on Air about Security on August 26.

Posted by: Eric Kuan, Webmaster Relations Specialist & Yuan Niu, Webspam Analyst
Categories: sysadmin

Debian: 3331-1: subversion: Summary - Mon, 2015-08-10 10:22 Security Report Summary
Categories: linux, news, security