Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Who drives $2,500 used sports cars? Teen boys (Score 1) 261

> TFA was bullshit when I saw the Supra on the list ranked at #4 (and the 3000 GT at #17). > They stopped making both of those cars well over 10 years ago

So they are sporty cars that are ten years old and now worth about $2,500. What kind of driver with $2,500 to spend on a car buys something sporty? Teenage boys, maybe?

Would teenage boys who drive sports cars be more likely to get tickets that a soccer mom in a minivan?

$2500? For a Supra?

The engine alone can command that.

Submission + - Hacking USB firmware

An anonymous reader writes: Now the NSA isn't the only one who can hack your USB firmware:

In a talk at the Derbycon hacker conference in Louisville, Kentucky last week, researchers Adam Caudill and Brandon Wilson showed that they’ve reverse engineered the same USB firmware as Nohl’s SR Labs, reproducing some of Nohl’s BadUSB tricks. And unlike Nohl, the hacker pair has also published the code for those attacks on Github, raising the stakes for USB makers to either fix the problem or leave hundreds of millions of users vulnerable.

Personally, I always thought it was insane that USB drives don't come with physical write-protect switches to keep them from being infected by malware.

Comment Re:Drink IPA (Score 1) 119

Really, this was modded up and mine was modded down? Have you never actually read anything about the history of the eruption? Everyone who was with him at the time was fine, he was the only one who was having trouble, because of his lousy health. Pliny the Younger blamed it on his "weak innards".

Comment Re:'Truman show' surveilance is the answer. (Score 1) 575

Indeed. Unfortunately that "security" does not include security for anyone criminal, and that by now includes everyone without immunity, including children. So in the end, all members of the police and all officials will have security and everybody else will be a criminal. Such is the way of the Police State.

Comment Re:Glad to be American ... (Score 1) 145

In Ohio, the stickers are printed on label printers, on a "secure" stock. Nothing special here - the driver licenses and state IDs are printed on off-the-shelf laminator printers, again using "secure" stock. I wouldn't be surprised if the "secure" stock were made in China and just offered for sale by some local company that has Ohio gov't contract. Printing of anything in China is really cheap, and access to high-tech printing technologies is rather easy.

Submission + - FDA issues Guidance on Cybersecurity of Medical Devices (securityledger.com)

chicksdaddy writes: The Security Ledger reports (https://securityledger.com/2014/10/fda-issues-guidance-on-security-of-medical-devices) that the U.S. Food and Drug Administration (FDA) has issued final guidance on Wednesday that calls on medical device manufacturers to consider cyber security risks as part of the design and development of devices.(http://www.fda.gov/NewsEvents/Newsroom/PressAnnouncements/ucm416809.htm)
The document, “Content of Premarket Submissions for Management of Cybersecurity in Medical Devices,” (http://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM356190.pdf) asks device makers seeking FDA approval of medical devices to disclose any “risks identified and controls in place to mitigate those risks” in medical devices. The guidance also recommends that manufacturers submit documentation of plans for patching and updating the operating systems and medical software that devices run.

While the guidance does not have the force of a mandate, it does put medical device makers on notice that FDA approval of their device will hinge on a consideration of cyber risks alongside other kinds of issues that may affect the functioning of the device. Among other things, medical device makers are asked to avoid worst-practices like 'hardcoded' passwords and use strong (multi-factor) authentication to restrict access to devices. Device makers are also urged to restrict software and firmware updates to authenticated (signed) code and to secure inbound and outbound communications and data transfers.

Slashdot Top Deals

<<<<< EVACUATION ROUTE <<<<<

Working...