Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Submission + - E-paper Display Gives Payment Cards a Changing Security Code

itwbennett writes: Using payment cards with an embedded chip makes payments more secure in physical stores, but it’s still relatively easy for criminals to copy card details and use them online. Payment specialist Oberthur Technologies has another idea, which it will soon be testing in France. Oberthur’s Motion Code technology replaces the printed 3-digit CVV (Card Verification Value) code with a small e-paper display. The code changes periodically, reducing the time a fraudster has to act.

Submission + - New Chrome Extension Uses Sound To Share URLs Between Devices (itworld.com)

itwbennett writes: Google Tone is an experimental feature that could be used to easily and instantly share browser pages, search results, videos and other pages among devices, according to Google Research. 'The initial prototype used an efficient audio transmission scheme that sounded terrible, so we played it beyond the range of human hearing,' researcher Alex Kauffmann and software engineer Boris Smus wrote in a post on the Google Research blog.

Submission + - Critical Vulnerability in NetUSB Driver Exposes Millions of Routers to Hacking

itwbennett writes: NetUSB, a service that lets devices connected over USB to a computer be shared with other machines on a local network or the Internet, is implemented in Linux-based embedded systems, such as routers, as a kernel driver. Once enabled, it opens a server that listens on TCP port 20005 for connecting clients. Security researchers from a company called Sec Consult found that if a connecting computer has a name longer than 64 characters, a stack buffer overflow is triggered in the NetUSB service.

Submission + - Google Offers Cheap Cloud Computing For Low-Priority Tasks (itworld.com)

jfruh writes: Much of the history of computing products and services involves getting people desperate for better performance and faster results to pay a premium to get what they want. But Google has a new beta service that's going in the other direction — offering cheap cloud computing services for customers who don't mind waiting. Jobs like data analytics, genomics, and simulation and modeling can require lots of computational power, but they can run periodically, can be interrupted, and can even keep going if one or more nodes they're using goes offline.

Submission + - In Desperation, Ransomware Victims Plead with Attackers (itworld.com)

itwbennett writes: Researchers from FireEye recently collected messages from a Web site set up by the creators of a ransomware program called TeslaCrypt to interact with their victims. The messages offer a rare glimpse into the mindset of these cybercriminals and the distress they cause. Among the victims: a father who has been robbed of his baby’s pictures; an employee who lost business files to the malware and now fears losing his job; a housecleaning business set up by maids who can’t afford to pay the ransom.

Submission + - FTC Recommends Conditions for Sale of RadioShack Customer Data (itworld.com)

itwbennett writes: The U.S. Federal Trade Commission has weighed in on the contentious issue of the proposed sale of consumer data by bankrupt retailer RadioShack, recommending that a model be adopted based on a settlement the agency reached with failed online toy retailer Toysmart.com. Jessica L. Rich, director of the FTC’s bureau of consumer protection, said in a letter to a court-appointed consumer privacy ombudsman that the agency’s concerns about the transfer of customer information inconsistent with RadioShack’s privacy promises 'would be greatly diminished' if certain conditions were met, including that the data was not sold standalone, and if the buyer is engaged in substantially the same lines of business as RadioShack, and expressly agrees to be bound by and adhere to the privacy policies.

Submission + - United Launches Bug Bounty, In-Flight Systems Off Limits

itwbennett writes: United Airlines is offering rewards to researchers for finding flaws in its websites but the company will not accept bugs found in onboard Wi-Fi, entertainment or avionics systems, which the U.S. government says may be increasingly targeted by hackers. And as a reward for their efforts, researchers won't get the piles of cash typically associated with such programs, but instead will get miles that can be used for the company’s Mileage Plus loyalty program.

Submission + - Qualcomm Wants To Power The Internet Of Things (itworld.com)

jfruh writes: The Internet Of Things — the world of omnipresent embedded network devices that true believers think is just around the corner — is a potential gold mine to whatever tech vendors can grab an early lead in the market. And Qualcomm thinks it's uniquely positioned to do so, with its solid background in low-powered processors and wireless networking giving it a leg up.

Submission + - China-Based Hackers Used Microsoft's TechNet for Attacks (itworld.com)

itwbennett writes: The China-based hacking group, which security vendor FireEye calls APT17, created accounts on TechNet and then left comments on certain pages. Those comments contained the name of an encoded domain, which computers infected by the group’s malware were instructed to contact. The encoded domain then referred the victim’s computer to a command-and-control server that was part of APT17’s infrastructure, said Bryce Boland, FireEye’s chief technology officer for Asia-Pacific.

Submission + - Apple, A123 To Settle Lawsuit Over Poached Battery Engineers (slashdot.org)

itwbennett writes: Slashdot readers will remember that back in February, electric car battery maker A123 Systems sued Apple for allegedly 'raiding' the Waltham, Massachusetts, company and hiring five employees, including two top-level engineers. The loss of these workers essentially forced A123 to shut down some of its main projects, the suit alleged. Now, according to court documents filed Monday, A123 and Apple 'have reached an agreement, signed a term sheet, and are in the process of drafting a final settlement agreement.'

Submission + - A Year Later, Google Still Not Very Likely To Forget You

itwbennett writes: A year after the European Union’s top court gave Europeans a right to be forgotten by search engines, it is most likely that Google will still remember you after you filed a request to disappear from its search listings. In fact, chances are that the search result you want to have removed when someone Googles your name will stay visible. That happens in almost 60 percent of cases, the company’s online transparency tool showed.

Submission + - Are App Developers Responsible for Decisions Their Users Make? (itworld.com)

itwbennett writes: In a blog post, Rado Kotorov, Chief Innovation Officer at Information Builders asserts that the creators of enterprise apps, not just developers, but anyone who is involved, from defining the concept, to requirements gathering, to final implementation, implicitly assume some of the responsibility for other people’s decision making. Thus, the creators of the app have an ethical obligation to ensure that people can reach the right conclusions from the facts and the way they are presented in the app.

Submission + - Uber Drivers In India Will Start Accepting Cash (itworld.com)

jfruh writes: One of the main selling points of ridesharing services like Uber are that they streamline the payment process: everything is taken care of in the app, which is already linked to your credit card. But in many places in the developing world, most people are unbanked and use only cash, and Uber will have to accommodate them to achieve its global ambitions. Thus, the company is launching a pilot project in India where passengers can pay in cash.

Submission + - MIT Algorithm Banishes Window Reflections In Photos (itworld.com)

itwbennett writes: Researchers at MIT and Google Research have developed a method to automatically remove reflections that appear when shooting photos through glass. The technique finds glass reflections in photos by using the fact that they're usually made up of two reflections, one slightly offset from the other. Since the second reflection is a set distance from the first, the researchers used an algorithm to distinguish the reflections from all the other data in the image.

Slashdot Top Deals

When bad men combine, the good must associate; else they will fall one by one, an unpitied sacrifice in a contemptible struggle. - Edmund Burke

Working...