Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Retitle "The UNtruth" (Score 1) 28

"According to Yahoo, the information that was stolen didn't have passwords or any other information that would allow unauthorized users to carry out user identity verification." So yahoo is forced to disclose a data breach by law. But they add to it the nothing important was taken. I would like you to think for your self for a minute. Does a burglar go around robbing homeless peoples shopping carts? People go after what has value, and they stole something. This story should read Yahoo Japan tries desperately to cover their data breach but has to admit to loosing user ID's.

Submission + - Honeywords (informationweek.com)

CowboyRobot writes: Businesses should seed their password databases with fake passwords and then monitor all login attempts for use of those credentials to detect if hackers have stolen stored user information. That's the thinking behind the "honeywords" concept first proposed this month in "Honeywords: Making Password-Cracking Detectable," a paper written by Ari Juels, chief scientist at security firm RSA, and MIT professor Ronald L. Rivest (the "R" in "RSA"). Honeywords aren't meant to serve as a replacement for good password security practices. But as numerous breaches continue to demonstrate, regardless of the security that businesses have put in place, they often fail to detect when users' passwords have been compromised.

Submission + - Dissecting RSA's "Watering Hole" Traffic Snippet (lmgsecurity.com)

rye writes: Even the tiniest snippets of network traffic reveal a lot-- not just about viruses and botnets, but also about the malware research lab setup inside corporations like RSA. Watch as Sherri Davidoff of LMG Security tears apart a teeny tiny snippet of gh0st RAT traffic released by RSA during their investigation of the VOHO "watering hole" attack.

Submission + - DragonFly BSD 3.4 Released, with new packaging system

An anonymous reader writes: DragonFly BSD has released version 3.4. This version is the first BSD to support GCC 4.7, and contains a new experimental Aptitude-like binary package installed called DPorts, which uses the FreeBSD ports collection as a base.

Submission + - Zerocoin Extension To Bitcoin Would Make It Truly Anonymous (forbes.com)

Sparrowvsrevolution writes: Bitcoin, despite what many users think, isn't really anonymous. Every transaction can be traced in the Bitcoin blockchain, making it in some ways even more difficult than traditional money to spend privately. But a group of cryptographers at Johns Hopkins University have come up with Zerocoin, an extension to the cryptographic currency that could make it truly anonymous and untraceable. If enough users adopted Zerocoin, it would represent an upgrade to Bitcoin's code that would allow any user to swap out his or her Bitcoins for Zerocoin tokens at any time and then redeem them for Bitcoins at will, using some clever cryptographic tricks to prevent anyone from tracing the tokens between those two transactions.

Until now, users who wanted to use Bitcoins for anonymous purposes (such as on the drug site Silk Road) have had to run them through a Bitcoin laundry service that mixes Bitcoins randomly to foil surveillance. But that's required depending on potentially shady third parties. Zerocoin would essentially build a laundry system into Bitcoin at the protocol level, without the need to trust anything other than the distributed code itself.

Slashdot Top Deals

"This generation may be the one that will face Armageddon." -- Ronald Reagan, "People" magazine, December 26, 1985

Working...