Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security

Submission + - New version of the MaControl trojan spotted in the wild (sans.edu)

EliSowash writes: "A new version of the MaControl malware has been reported in the wild. More information on the malware, its behaviour, and the attack campaign is available from Kaspersky Labs, who discovered this variant. As more malware authors become motivated to attack OS X it is likely that we will continue to see targeted attacks such as this in the future. Just like with PC malware, a combination of exploits and social engineering tricks are generally the most effective; it won’t be surprising to see a spike in such attacks soon.

MaControl has been mentioned before on Slashdot"

Comment Maybe it's not about the IP at all (Score 5, Insightful) 128

A little part of me wonders if the lawsuits are as much a strategic business plan to foil the competition. Y'know, like throwing around some bad press will dissuade investors, and a court ordered delay for a product's entrance to market in a particular region will cost the opponent so much in revenue, and allow the plaintiff time to get a foothold in the marketplace. Sort of 'gaming' the legal system to get a competitive edge, without so much concern for the outcome of the suit.
Piracy

Submission + - Stuxnet, Duqu, Flame Targeted pirated Windows Systems In Iran (darkreading.com)

EliSowash writes: "An oft-overlooked detail about Stuxnet, Duqu, and Flame is that the attacks all targeted Windows machines in Iran even though Windows isn't allowed to be sold there under U.S. export restriction laws.

Software piracy and smuggling are a big problem in countries, such as Iran, that are banned from many high technology imports under economic sanctions. Stopping those illegal activities in Iran and other trade-sanctioned countries is difficult and often unrealistic, leaving many U.S. vendors to come to accept that their software is pirated there."

Android

Submission + - First Android Bootkit discovered in 3rd Party Appstores (nq.com)

EliSowash writes: "Researchers at NQ Mobile have uncovered what they say may be the first Google Android bootkit. Dubbed DKFBootKit, the malware was spotted on third-party app stores.

"DKFBootKit is able to steal personal information from user devices," notes Xuxian Jiang, NQ Mobile's chief scientist. "More alarmingly, it is a bot client that can retrieve and run commands from remote C&C servers." In the past two weeks, DKFBootKit has infected more than 1,657 Android devices."

Crime

Submission + - Visa and MasterCard warn of "Massive" Breach at Card Processor (majorgeeks.com) 1

concealment writes: "Visa and MasterCard are warning of what they call a “massive breach” that could involve as many as 10 million compromised credit card numbers.

The breach occurred between January 21, 2012 and February 25th 2012. They say that this information, known as full Track 1 and Track 2 data, could be used to counterfeit new cards."

The Internet

Submission + - Could Anonymous bring down the web?

EliSowash writes: "I once heard Anonymous described as "a handful of geniuses surrounded by a legion of idiots.” But, they've made it pretty clear they intend to "shut down the internet" on March 31 in what they call Operation Global Blackout. Their "plan" is to knock out the 13 root DNS servers. Seems easy enough, right? The IP addresses are published, there's only 13, seems a prime target for a DDoS.

But, as Cricket Liu explaints , the real world just ain't that easy. The boffins that manage the root DNS servers have designed a fault tolerant and resiliant infrastructure. Those 13 IP addresses actually represent about 280 individual name servers, unicasting across the internet in such a way that a DDoS is practically impossible."

Slashdot Top Deals

"Protozoa are small, and bacteria are small, but viruses are smaller than the both put together."

Working...