×
Security

Want To Hijack a Domain? Just Get a Fax Machine 162

msm1267 writes "Metasploit's HD Moore says hackers sent a spoofed DNS change request via fax to Register.com that the registrar accepted, leading to a DNS hijacking attack against the Metasploit and Rapid7 websites. The two respective homepages were defaced with a message left by the same hacker collective that claimed responsibility for a similar DNS attack against Network Solutions. Rapid7 said the two sites' DNS records have been locked down and they are investigating."
Security

Stealing Silicon Valley 139

pacopico writes "A series of robberies in Silicon Valley have start-ups feeling nervous. According to this report in Businessweek, a couple of networking companies were burgled recently with attempts made to steal their source code. The fear is that virtual attacks have now turned physical and that espionage in the area is on the rise. As a result, companies are now doing more physical penetration testing, including one case in which a guy was mailed in a FedEx box in a bid to try and break into a start-up."
China

China Arrests Anti-Corruption Blogger 113

quantr tips this news from Bloomberg: "A Chinese journalist who posted allegations of corrupt dealings during the privatization of state-owned assets has been formally arrested on a defamation charge, his lawyer said. The Beijing People's Procuratorate approved Liu Hu's arrest on Sept. 30, lawyer Zhou Ze said by phone yesterday. Liu, who worked for the Guangzhou-based New Express, had been in detention since Aug. 24, according to Zhou. Liu's arrest adds to evidence that the government is stepping up a crackdown against people who go online with revelations of official malfeasance. At the same time that the Communist Party has vowed to get tough on corruption, authorities have targeted outspoken bloggers and announced that people who post comments deemed defamatory could face as much as three years behind bars."
Space

Diamond Rain In Saturn 177

Taco Cowboy writes "Back in 1999, it was postulated that diamonds may rain from the sky in the atmospheres of our solar system's gas giants. Now, research has shown that diamond rains on Saturn are more than probable. '"We don't want to give people the impression that we have a Titanic-sized diamondberg floating around," said researcher Mona Delitsky, of California Specialty Engineering, "We're thinking they're more like something you can hold in your hand." Recent data compiled by planetary scientists ... has been combined with newly published pressure temperature diagrams of Jupiter and Saturn. These diagrams, known as adiabats, allow researchers to decipher at what interior level that diamond would become stable. They also allow for calculations at lower levels – regions where both temperature and pressure are so concentrated that diamond becomes a liquid. Imagine diamond rain or rivulets of pure gemstone.' 'At even greater depths, the scientists say the diamond will eventually melt to form liquid diamond, which may then form a stable ocean layer.'
Desktops (Apple)

Shuttleworth: Apple Will Merge Mac and iPhone 414

Barence writes "Canonical founder Mark Shuttleworth claims Apple will follow Ubuntu's lead and converge the iPhone and MacBook product lines. Speaking to PC Pro to mark the upcoming launch of Ubuntu 13.10, Shuttleworth said that the failed Ubuntu Edge smartphone — an attempt to bridge mobile and desktop computing devices — had set an example that others will follow. 'We've seen a very interested ripple go through the industry, and an uptick in interest in convergence,' Shuttleworth added. 'People are saying yes, mobile processors are catching up with the desktop. When Apple announced the iPhone 5s, it called the processor "desktop-class," and I don't think that was an accident – it was sending what we think is a very clear signal that it will converge the iPhone and the MacBook Air.'"
Cellphones

Sensor Characteristics Uniquely Identify Individual Phones 69

An anonymous reader writes "SFGate reports that Stanford researchers have figured out a way to generate a unique fingerprint from a cell phone's suite of built-in sensors. The tiny accelerometers, gyroscopes, microphones, and speakers in cell phones have characteristics that vary slightly from handset to handset, and these variations may contain enough information to uniquely identify a given handset. How that information might get from the phone to a third party varies (the article describes a JavaScript snippet reading the Z-axis accelerometer, though it says little about how the user might block such information from being read), but the possibility for abuse is certainly troubling."
Blackberry

BlackBerry Founders May Try To Take Over the Company 118

New submitter Adamsobert sends this excerpt from the NY Times: "In a regulatory filing on Thursday, Mike Lazaridis and Douglas Fregin said that they were considering a bid for the 92 percent of the company that they do not own. ... Their potential bid joins a growing list of expressions of interest in the company, which recently reported a $1 billion quarterly loss caused by the market's rejection of new smartphones that were supposed to revive BlackBerry's prominence. Fairfax Financial Holdings of Toronto has made a conditional, nonbinding offer to buy the 90 percent of BlackBerry shares it does not own for $9 each. That would value the company at about $4.7 billion."
Privacy

CPJ Report: the Obama Administration and Press Freedoms 289

dryriver writes "Committee To Protect Journalists reports: U.S. President Barack Obama came into office pledging open government, but he has fallen short of his promise. Journalists and transparency advocates say the White House curbs routine disclosure of information and deploys its own media to evade scrutiny by the press. Aggressive prosecution of leakers of classified information and broad electronic surveillance programs deter government sources from speaking to journalists. In the Obama administration's Washington, government officials are increasingly afraid to talk to the press. Those suspected of discussing with reporters anything that the government has classified as secret are subject to investigation, including lie-detector tests and scrutiny of their telephone and e-mail records. An 'Insider Threat Program' being implemented in every government department requires all federal employees to help prevent unauthorized disclosures of information by monitoring the behavior of their colleagues. Six government employees, plus two contractors including Edward Snowden, have been subjects of felony criminal prosecutions since 2009 under the 1917 Espionage Act, accused of leaking classified information to the press—compared with a total of three such prosecutions in all previous U.S. administrations. Still more criminal investigations into leaks are under way. Reporters' phone logs and e-mails were secretly subpoenaed and seized by the Justice Department in two of the investigations, and a Fox News reporter was accused in an affidavit for one of those subpoenas of being 'an aider, abettor and/or conspirator' of an indicted leak defendant, exposing him to possible prosecution for doing his job as a journalist. In another leak case, a New York Times reporter has been ordered to testify against a defendant or go to jail."
The Courts

EU Court Holds News Website Liable For Readers' Comments 246

angry tapir writes "Seven top European Union judges have ruled that a leading Internet news website is legally responsible for offensive views posted by readers in the site's comments section. The European Court of Human Rights found that Estonian courts were within their rights to fine Delfi, one of the country's largest news websites, for comments made anonymously about a news article, according to a judgment."
Technology

Qualcomm to Build Neuro-Inspired Chips 43

Bismillah writes "At the MIT Technology Review EmTech conference, Qualcomm announced that the company and partners will design and make neural processing units or NPUs starting next year. NPUs mimic the neural structures and how the brain processes information in a massively parallel way, while being extremely power efficient, and may end up in self-learning devices."
Television

BBC Unveils Newly Discovered Dr.Who Episodes 184

BigBadBus writes "Putting an end to months of speculation, the BBC announced at a press conference today that it had recovered 9 previously lost episodes of Dr.Who, from the Patrick Troughton era (1966-69). The episodes complete 'The Enemy of the World' and almost complete 'The Web of Fear' (leaving one episode outstanding). The episodes were found in a relay station in Nigeria by Phillip Morris; previously Nigeria had been checked and had returned 6 lost episodes in 1984. The episodes are now available from UK and US iTune stores and can be for pre-ordered from Amazon.co.uk"
Google

Google X Display Boss: Smartphones, Tablets, Apps Are "Mind-Numbing" 157

curtwoodward writes "Stop drooling over that new iPhone. Put away the fancy tablet. Because the real hardcore nerds find that stuff 'boring' and 'mind-numbing,' says Mary Lou Jepsen, head of the display division at secretive R&D lab Google X. At MIT's EmTech conference, Jepsen said the next generation of 'moonshot' tech is much more exciting and interesting. That includes Google X projects like the driverless car, Project Loon, a stratospheric balloon-based wireless network, and Google Glass."
DRM

The W3C Sells Out Users Without Seeming To Get Anything In Return 348

An anonymous reader writes "Questioning the W3C's stance on DRM, Simon St. Laurent asks 'What do we get for that DRM?' and has a thing or two to say about TBL's cop-out: 'I had a hard time finding anything to like in Tim Berners-Lee's meager excuse for the W3C's new focus on digital rights management (DRM). However, the piece that keeps me shaking my head and wondering is a question he asks but doesn't answer: If we, the programmers who design and build Web systems, are going to consider something which could be very onerous in many ways, what can we ask in return? Yes. What should we ask in return? And what should we expect to get? The W3C appears to have surrendered (or given?) its imprimatur to this work without asking for, well, anything in return. "Considerations to be discussed later" is rarely a powerful diplomatic pose.'"
Power

Fusion "Breakthrough" At National Ignition Facility? Not So Fast 118

sciencehabit writes "One unintended effect of the U.S. federal shutdown is that helpful press officers at government labs are not available to provide a reality check to some of the wilder stories that can catch fire on the Internet. They would have come in handy this week, when a number of outlets jumped on a report on the BBC News website. The National Ignition Facility (NIF) at Lawrence Livermore National Laboratory in California, it reported, had passed a 'nuclear fusion milestone.' NIF uses the world's highest energy laser system to crush tiny pellets containing a form of hydrogen fuel to enormous temperature and pressure. The aim is to get the hydrogen nuclei to fuse together into helium atoms, releasing energy. The BBC story reported that during one experiment last month, 'the amount of energy released through the fusion reaction exceeded the amount of energy being absorbed by the fuel — the first time this had been achieved at any fusion facility in the world.' This prompted a rush of even more effusive headlines proclaiming the 'fusion breakthrough.' As no doubt NIF's press officers would have told reporters, the experiment in question certainly shows important progress, but it is not the breakthrough everyone is hoping for."
Power

Largest US Power Storing Solar Array Goes Live 377

Lucas123 writes "A solar power array that covers three square miles with 3,200 mirrored parabolic collectors went live this week, creating enough energy to power 70,000 homes in Arizona. The Solana Solar Power Plant, located 70 miles southwest of Phoenix, was built at a cost of $2 billion, and financed in large part by a U.S. Department of Energy loan guarantee. The array is the world's largest parabolic trough plant, meaning it uses parabolic shaped mirrors mounted on moving structures that track the sun and concentrate its heat. A first: a thermal energy storage system at the plant can provide electricity for six hours without the concurrent use of the solar field. Because it can store electricity, the plant can continue to provide power during the night and inclement weather."

Slashdot Top Deals