Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

The World's Most Hackable Cars

Soulskill posted about a month and a half ago | from the cylons-were-created-by-man dept.

Transportation 53

ancientribe writes: If you're wondering whether the most tech-loaded vehicles are also the most vulnerable to hackers, there is now research that shows it. Charlie Miller, a security engineer with Twitter, and Chris Valasek, director of security intelligence at IOActive, studied modern auto models and concluded that the 2014 Jeep Cherokee, the 2014 Infiniti Q50, and the 2015 Escalade are the most likely to get hacked. The key is whether their networked features that can communicate outside the vehicle are on the same network as the car's automated physical functions. They also name the least-hackable cars, and will share the details of their new findings next week at Black Hat USA in Las Vegas.

Ask Slashdot: IT Personnel As Ostriches?

Soulskill posted about a month and a half ago | from the head-in-the-sand dept.

Businesses 246

MonOptIt writes: I'm a new IT professional, having recently switched from a different sci/tech field. My first gig is with a mid-size (50ish) nonprofit which includes a wide variety of departments and functions. I'm the sole on-site IT support, which means that I'm working with every employee/department regularly both at HQ and off-site locations. My questions for the seasoned pros are: Do you find yourself deliberately ignoring office politics, overheard conversations, open documents or emails, etc as you go about your work? If not, how do you preserve the impartiality/neutrality which seems (to my novice mind) necessary to be effective in this position? In either case: how do you deal with the possibility of accidentally learning something you're not supposed to know? E.g. troubleshooting a user's email program when they've left sensitive/eyes-only emails open on their workstation. Are there protections or policies that are standard, or is this a legal and professional gray-area?

Fixing a 7,000-Ton Drill

Soulskill posted about a month and a half ago | from the it's-probably-just-your-alternator dept.

Technology 101

An anonymous reader writes: At the end of last year, we discussed Bertha, the world's largest tunnel boring machine. During an effort to drill a viaduct beneath downtown Seattle, the machine — clocking in at 7,000 tons, 57.5 feet in diameter, and 326 feet long — got hamstrung by an 8-inch-diameter steel pipe. The complexity and scope of the repair plan rivals that of the project itself. "The rescue operation (workers call it "the intervention") began in late spring with construction on the shaft to reach Bertha. Workers have been sinking pilings in a ring to prevent the shaft from collapsing, using 24,000 cubic yards of concrete — enough for a medium-size office building. Once that ring is complete, digging on the shaft will start. When the shaft is ready, Bertha, which is damaged but still operational, will be turned back on so she can chew through the concrete pilings to reach the center of the shaft. There, the machine will rest on a cradle where workers can detach the front end and hoist it out." That detachable front end? It weighs about 2,000 tons by itself. The repair bill is estimated at about $125 million.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>