Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Media

Submission + - Inside the Targeted Attack on The New York Times (threatpost.com)

Trailrunner7 writes: The Chinese group behind the targeted attack on the New York Times was laser focused on accessing the email of a reporter and the newspaper’s former Beijing bureau chief to the point that it used an inordinate number of custom malware samples to get the job done.

“In terms of statistics, 45 [custom malware samples] as a ratio to the number of computers involved, 53, is a high ratio,” said Richard Bejtlich, chief security officer of Mandiant, the forensics firm hired by the Times to investigate the targeted attack. “Usually, you’ll see one or two for the relatively small number of systems involved.”

Bejtlich said his company’s investigators were able to match the activity used in this attack to a particular group of Chinese attackers using a suite of indicators of compromise that Mandiant has built over the years.

“We identify systems with problems and collect forensic artifacts and match those with threat groups we’ve been tracking for years to see if they match,” he said. “We look for certain tools or command and control infrastructure that are earmarks used by certain groups. Then we’ll go through a second process to see if we can narrow that down.”

Science

Submission + - Doctors practiced US soldier's 13 hour double arm transplant four times (geek.com) 1

An anonymous reader writes: In April 2009 Brendan Marrocco suffered serious injuries when his unit’s vehicle was hit by an Explosive Fired Projectile (EFP) while undertaking a night mission in Iraq. Brendan survived, but his injuries meant doctors had to amputate both his arms and legs. The fact that he recovered at all is amazing, but as of yesterday Brendan has his arms back due to a compatible donor and a successful double arm transplant.

The 13 hour operation (including attaching the bones, muscles, nerves, tendons, blood vessels, and finally the skin of both arms) was preceded by months of planning, which included the doctors carrying out the full operation four times using cadavers. Such careful planning and practice is essential, as even one mistake could have seen the new arms rejected and Brendan potentially suffering complications because of it.

Network

Submission + - Fujitsu's New Data Transfer Protocol 30 Times Faster than TCP (paritynews.com) 1

hypnosec writes: Japan based technology giant, Fujitsu, has announced a new data transfer protocol that is capable of transferring data up to 30 times faster than that of currently used Transmission Control Protocol (TCP). The new technology, which is a proprietary, has been developed through a software-only approach and is based on User Datagram Protocol (UDP) that is used in streaming media. Even though UDP is a stateless protocol, Fujitsu’s technology has been developed such that it can differentiate between dropped packers and those which haven’t managed to reach the intended destination. Fujitsu carried out tests between US and Japan and the results were amazing – a 30 times improvement over TCP communications in data transfer throughput and a reduction in packet delivery latency to a sixth of previous levels.
Power

Submission + - US Deserves Transparency From Oil Refineries

Hugh Pickens writes writes: "Gregg Laskoski writes in US News and World Report that virtually all of the retail gasoline price volatility that Americans experienced this past year was connected to significant problems at refineries and it was those refineries' vulnerability that subjected US consumers to the year's highest average price ever, $3.63 per gallon. February delivered the BP refinery fire in Cherry Point, Washington that led to gasoline price spikes all along the Pacific coast, refinery problems in the Great Lakes region pushed Chicago gas prices to an all-time high of $4.56 per gallon, and over the summer, west coast refineries incurred outages, and California saw record highs in most markets, with Los Angeles gasoline's average price peaking at $4.72/gallon in October. Finally after Reuters reported that some 7,700 gallons of fuel spilled from Phillips 66's Bayway refinery in Linden, NJ, after Hurricane Sandy, New Jersey environmental protection officials said they were not made aware of a major spill at the Bayway plant, and the refinery failed to respond to inquiries from Reuters reporters. "Too many times, history has shown us, the Phillips 66 response or lack thereof characterizes the standard practice of the oil industry. Refineries often fail or are slow to communicate problems that create significant disruptions to fuel supplies and spikes in retail gasoline prices. More often than not, scant information is provided reluctantly, if at all," writes Laskoski. "When such things occur is silence from refineries acceptable? Or does our government and the electorate who put them there have a right to know what's really going on?""

Comment Free Market.... (Score 1) 327

One of the biggest hold ups to IPV6 implementation is those IP (tier 1 and above) companies that own IPV4 addresses. Now a salable commodity the IPV4 addresses are becoming more valuable as scarcity increases. The volume of IPv4 traffic makes it a more lucrative revenue stream. Implementing V6 will make those V4 addresses worthless, and so where is the incentive to change? Politics and people
Crime

Submission + - Backpack carries books and stop bullets (gizmag.com)

Pyrotech7 writes: Only $300, also offered is Tactical Vest. In the wake of last week’s horrific shootings in Connecticut, we’re sure to be seeing a lot more products like this cropping up. Made by Salt Lake City-based body armor company Amendment II, it’s called the Ballistic Backpack, and it’s designed to protect its wearer from bullets.

Although the backpack could conceivably be used by anyone, it’s no doubt intended largely for use by school children – previous models even came with pictures of princesses and The Avengers on them. The idea is that it will protect the user (or part of them, at least) as they’re running away from an attack, or serve as a shield if held up between the user and an attacker.

Just when you think you have seen it all a Ballistic Backpack to make our schools safer.

AI

Submission + - China blocks VPN connections using machine learning algorithms?

An anonymous reader writes: The internet control in China seems to have been tightened recently, according to the Guardian [guardian.co.uk]. Several VPN providers claimed that the censorship system can "learn, discover and block" encrypted VPN protocols.

Using machine learning algorithms in protocol classification is not exactly a new topic in the field [scholar.google.com]. And given the fact that even the founding father of the "Great Firewall", Fan Bingxing [wikipedia.org] himself has also written a paper about utilizing machine learning algorithm in encrypted traffic analysis [ieee.org], it would be not suprising at all, if they are now starting to identify suspicious encrypted traffic using numerically efficient classifiers. [springer.com]

So the arm race between anti-censorship and surveillance technology goes on .

Submission + - Chocolate celebration for the new Mayan calendar-cycle (maya-archaeology.org)

frisket writes: "As the new Mayan baktun starts, amid all the bogus apocalypse rumours, surely we need to celebrate this event with the Maya, as it won't re-occur any time soon. As chocolate was so important in their culture and religion, how's about we all bring some chocolate to our co-workers, friends, neighbours, relations, etc? Or do Slashdotters have even better ways to celebrate?"

Submission + - MIT research shows new magnetic state that could aid quantum computing (networkworld.com)

alphadogg writes: Researchers at MIT and other institutions have demonstrated a new type of magnetism, only the third kind ever found, and it may find its way into future communications, computing and data storage technologies. Working with a tiny crystal of a rare mineral that took 10 months to make, the researchers for the first time have demonstrated a magnetic state called a QSL (quantum spin liquid), according to MIT physics professor Young Lee. He is the lead author of a paper on their findings, which is set to be published in the journal Nature this week. Theorists had said QSLs might exist, but one had never been demonstrated before. "We think it's pretty important," Lee said, adding that he would let his peers be the ultimate judges.
Linux

Submission + - Humble Indie Bundle 7 Will Be Worst Humble Bundle Ever For Linux (thepowerbase.com)

An anonymous reader writes: Those that are feeling a little miffed by the latest Humble THQ Bundle are probably anxiously awaiting the promised Humble Indie Bundle 7. Bundle number 7 is currently being promised on the Humble Bundle homepage to those users that are not bashful with their email addresses. While no communication has been sent by the Humble Gang yet, there are a few details available.

While browsing the infamous CDR database, we stumbled across a listing for Humble Indie Bundle 7 and Humble Indie Bundle 7: Beat The Average. So how could a Humble Indie Bundle possibly be disappointing, or even worst Humble Bundle ever? So far, they are no linux native games. In addition to that, there are no games making their debut with this bundle. Faithful purchasers of past bundles likely already own all of these games.

Earth

Submission + - Scientists Say Life on Land May Not Have Evolved From the Sea 1

Hugh Pickens writes writes: "Conventional wisdom has it that complex life evolved in the sea and then crawled up onto land but NPR reports that a provocative new study published in Nature suggests that the earliest large life forms may have appeared on land long before the oceans filled with creatures that swam and crawled and burrowed in the mud. Paleontologists have found fossil evidence for a scattering of animals called Ediacarans that predate the Cambrian explosion, about 530 million years ago when complex life suddenly burst forth and filled the seas with a panoply of life forms. Many scientists have assumed Ediacarans were predecessors of jellyfish, worms and other invertebrates but palaeontologist Greg Retallack has been building the case that Ediacarans weren't in fact animals, but actually more like fungi or lichens and that Ediacarans weren't even living in the sea, as everyone has assumed. "What I'm saying for the Ediacaran is that the big [life] forms were on land and life was actually quite a bit simpler in the ocean," says Retallack adding that his new theory lends credence to the idea that life actually evolved on land and then moved into the sea. Paul Knauth at Arizona State University has been pondering this same possibility. "I don't have any problem with early evolution being primarily on land," says Knauth. "I think you can make a pretty good argument for that, and that it came into the sea later. It's kind of a radical idea, but the fact is we don't know." Knauth says it could help explain why the Cambrian explosion appears to be so rapid. It's possible these many life forms gradually evolved on the land and then made a quick dash to the sea. "That means that the Earth was not a barren land surface until about 500 million years ago, as a lot of people have speculated.""

Submission + - Ban on loud TV commercials takes effect today (networkworld.com) 1

netbuzz writes: "A new law banning broadcasters from delivering TV commercials at a higher volume takes effect today at the end of a yearlong implementation period. Called the CALM Act, or Commercial Advertisement Loudness Mitigation Act, the law does provide for violators to be fined. TV commercials that crank up the volume have been the No. 1 complaint logged with the FCC over the last 10 years."
Privacy

Submission + - New 'Sanny' Cyberespionage Attack Targets Russia (darkreading.com)

CowboyRobot writes: "A new targeted attack campaign with apparent Korean ties has been stealing email and Facebook credentials and other user-profile information from Russian telecommunications, IT, and space research organizations. The attackers are grabbing email user accounts and passwords from Outlook, as well as information about the victims' email server. "Once you have that information, you have access to employees' emails even from outside, and that means a lot of official information,""
Hardware

Submission + - Toshiba develops MRAM for mobile processors (bit-tech.net)

Taco Cowboy writes: Toshiba has announced the development of a prototype memory element for a spin transfer torque magnetoresistive random access memory (STT-MRAM) as a replacement for static RAM (SRAM) cache for mobile devices.

The new memory element overcomes the longstanding operating trade-off by securing improved speed while reducing power consumption by a whooping 90%. The improved structure is based on perpendicular magnetization and takes element miniaturization to below 30nm. Introduction of this newly designed "normally-off" memory circuit with no passes for current to leak into cuts leak current to zero in both operation and standby without any specific power supply management.

Toshiba expects to bring the new memory element to STT-MRAM cache memory for mobile processors integrated into smartphones and tablets, and will promote accelerated R&D toward that end.

Slashdot Top Deals

Lots of folks confuse bad management with destiny. -- Frank Hubbard

Working...