Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - Canon's image verification system cracked (h-online.com)

TJNoffy writes: The H Security's H-online reports that "Hacker Dmitry Sklyarov has succeeded in extracting the secret signing key from numerous digital SLR cameras and has used it to sign modified images which Canon's latest OSK-E3 security kit verifies as legitimate. Canon's Original Data Security System is intended to show whether changes have been made to photographs and to verify date and location information.

The system is primarily used for ensuring the integrity of evidence, for reporting accidents and for construction records. The system is also useful for allowing news agencies to determine whether images have been modified. Sklyaro informed Canon of the vulnerability back in September, but has received no response from the camera manufacturer."

Submission + - Zombies as Metaphor for the Modern Human Condition (nytimes.com)

untitled90 writes: Chuck Klosterman pronounces that "a lot of modern life is exactly like slaughtering zombies." Starting with emails in the morning to the barrage of advertisements any time we step outside or onto the Internet, life has become more repetitive than it is complex. We combat the daily barrage of information as one would resist the coming zombie apocalypse: never expecting relief, only expecting to kill this zombie as a prelude to killing the next. Thus we fight not to lose ourselves in the deluge. "Our enemy is relentless and colossal, but also uncreative and stupid."
Piracy

Submission + - LimeWire to close music store for good this time (tekgoblin.com)

tekgoblin writes: With the recent injuction against LimeWire to stop distributing its file sharing client comes more bad news. The company had just announced to its music partners that it will be closing its online store for good. In a letter sent to it's partners it mentions that an attempt was made to keep the store running for 3 years but the injunction is such a large blow that it is no longer possible to stay open.

Submission + - Britain Resists Extraditing Hacker Gary McKinnon (globalpost.com)

dinoyum writes: The basic facts of the McKinnon case are not in dispute. In 2001 and 2002, Gary McKinnon, a computer programmer from Glasgow, accessed NASA and Defense Department computers on more than 90 occasions. The United States claims he hacked his way into the systems, rendered one naval computer inoperable for several days, and copied files from others, causing $800,000 dollars worth of damage. McKinnon claims he hacked into nothing. He gained entry into bits of the system without using a password. Indeed, he left messages after his visits pointing out how lousy the Defense Department security systems were. . . McKinnon's mother, Janis Sharp, made a compelling public case expressing fear for her son's life if he was transferred to an American prison. He suffers from Asperger's Syndrome, an autistic spectrum disorder, and also depression. She has organized a successful online information campaign.
Wireless Networking

Submission + - Droid 2 allegedly explodes, bloodies man (networkworld.com) 1

alphadogg writes: A north Texas man reported Thursday that his Motorola Droid 2 smartphone exploded next to his ear as he was ending a call, resulting in a bloodied face and a trip to the hospital.

Fortunately, no hearing loss occurred, according to a report by WFAA-TV in Dallas/Forth Worth. http://www.wfaa.com/news/health/Man-hospitalized-after-phone--111203854.html And yes, the phone was actually still working after the incident.

The man said he heard a loud pop from his just two-day-old phone and then felt blood running down his face as a result of the shattered glass covering, according to the report. He received four stitches at the hospital.

Motorola issued a statement that it will reach out to the customer and investigate the incident thoroughly.

PlayStation (Games)

Submission + - Sony Unveils Mysterious TV w/ Built In PS2 Console (itproportal.com) 1

siliconbits writes: The KDL-22PX300 hit the headlines because it comes with a built in Playstation 2 built-in, one that doubles as a DVD reader. It also has two Ethernet ports, Bravia Internet, twin optical digital outputs, four HDMI ports, three USB sockets, SCART, PC input and more. But where does it come from and why would Sony build such an oddity?

Submission + - TSA Told To Tell Children That Groping Is A Game (techdirt.com)

Marc Desrochers writes: Apparently TSA agents are being told that one way to handle the new groping pat downs for children is to try to make it out to be some sort of "game." This is apparently horrifying some sex abuse experts who point out that a common tactic in abuse cases is to tell the kids that they're just "playing a game." The TSA has said that the newer patdowns will not apply to children under 12, but the rules have been somewhat unclear — leading to the statement from a TSA director, James Marchand:

        "You try to make it as best you can for that child to come through. If you can come up with some kind of a game to play with a child, it makes it a lot easier."

He also said that the idea of making it a game would become a part of the TSA's training. Ken Wooden, who runs an organization to try to stop sex abuse of children was not pleased:

        "How can experts working at the TSA be so incredibly misinformed and misguided to suggest that full body pat downs for children be portrayed as a game?" Wooden asked in an email. "To do so is completely contrary to what we in the sexual abuse prevention field have been trying to accomplish for the past thirty years."

Microsoft

Submission + - Researchers Bypass IE Protected Mode (threatpost.com)

Trailrunner7 writes: A new paper from researchers at Verizon Business identifies a method through which an attacker can bypass Internet Explorer Protected Mode and gain elevated privileges once he's successfully exploited a bug on the system. Protected Mode in Internet Explorer is one of a handful of key security mechanisms that Microsoft has added to Windows in the last few years. It is often described as a sandbox, in that it is designed to prevent exploitation of a vulnerability in the browser from leading to more persistent compromise of the underlying system. Protected Mode was introduced in Windows Vista and Internet Explorer 7, and other software vendors have followed Microsoft's lead, introducing sandboxes in applications such as Adobe Reader X and Google Chrome.

In their research, the Verizon Business team found a method that, when combined with an existing memory-corruption vulnerability in the browser, enables an attacker to bypass Protected Mode and elevate his privileges on the compromised machine. The technique enables the attacker to move from a relatively un-privileged level to one with higher privileges, giving him complete access to the logged-in user's account.

Slashdot Top Deals

Beware of Programmers who carry screwdrivers. -- Leonard Brandwein

Working...