Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Censorship

Could Maroney Be Prosecuted For Her Own Hacked Pictures? 274

Contributor Bennett Haselton writes with a interesting take on the recent release of racy celebrity photos: "Lawyers for Olympic gymnast McKayla Maroney succeeded in getting porn sites to take down her stolen nude photos, on the grounds that she was under 18 in the pictures, which meant they constituted child pornography. If true, that means that under current laws, Maroney could in theory be prosecuted for taking the original pictures. Maybe the laws should be changed?" Read on for the rest.

Submission + - Lost Opportunity? Windows 10 Has The Same Minimum PC Requirements As Vista (hothardware.com) 1

MojoKid writes: Buried in the details of Microsoft's technical preview for Windows 10 is a bit of a footnote concerning the operating system's requirements. Windows 10 will have exactly the same requirements as Windows 8.1, which had the same requirements as Windows 8, which stuck to Windows 7 specs, which was the same as Windows Vista. At this point, it's something we take for granted with future Windows release. As the years roll by, you can't help wondering what we're actually giving up in exchange for holding the minimum system spec at a single-core 1GHz, 32-bit chip with just 1GB of RAM. The average smartphone is more powerful than this these days. For decades, the standard argument has been that Microsoft had to continue supporting ancient operating systems and old configurations, ignoring the fact that the company did its most cutting-edge work when it was willing to kill off its previous products in fairly short order. what would Windows look like if Microsoft at least mandated a dual-core product? What if DX10 — a feature set that virtually every video card today supports, according to Valve's Steam Hardware Survey, became the minimum standard, at least on the x86 side of the equation? How much better might the final product be if Microsoft put less effort into validating ancient hardware and kicked those specs upwards, just a notch or two?
Intel

Intel Drops Gamasutra Sponsorship Over Controversial Editorials 724

An anonymous reader writes Processor firm Intel has withdrawn its advertising from Gamasutra in response to the site's decision to carry feminist articles. The articles had drawn the ire of the self-described "Gater" movement, a grass-roots campaign to discredit prominent female games journalists. Intel was apparently so inundated with criticism for sponsoring the Gamasutra site that it had no choice but to withdraw support. An Intel spokesperson explained that "We take feedback from our customers very seriously especially as it relates to contextually relevant content and placements" and as such Gamasutra was no longer an appropriate venue for their products."

Submission + - Is it still worth grandfathering on Verizon's Unlimited data plan?

An anonymous reader writes: I understand a lot of people dislike Verizon in general, but assuming for a moment that they were your only option for a cellular service provider, is staying on their grandfathered unlimited data plan still worth it? Their recent announcement to not throttle traffic is inpiring, but I just don't know the long-term benefits of staying on this plan. I fear there is a tipping point where enough people will swap over to a metered plan and Verizon will ultimately abandon the unlimited altogether and assume the risk of losing a percentage of those remaining folks, at which point all of us who bought unsubsidized phones will have wasted the money doing so. Does anyone have any insight on this?

Submission + - MIT Thinks It Has Discovered the 'Perfect' Solar Cell (vice.com)

Daniel_Stuckey writes: A new MIT study offers a way out of one of solar power's most vexing problems: the matter of efficiency, and the bare fact that much of the available sunlight in solar power schemes is wasted. The researchers appear to have found the key to perfect solar energy conversion efficiency—or at least something approaching it. It's a new material that can accept light from an very large number of angles and can withstand the very high temperatures needed for a maximally efficient scheme.

Conventional solar cells, the silicon-based sheets used in most consumer-level applications, are far from perfect. Light from the sun arrives here on Earth's surface in a wide variety of forms. These forms—wavelengths, properly—include the visible light that makes up our everyday reality, but also significant chunks of invisible (to us) ultraviolet and infrared light. The current standard for solar cells targets mostly just a set range of visible light.

Security

Building a Honeypot To Observe Shellshock Attacks In the Real World 41

Nerval's Lobster writes A look at some of the Shellshock-related reports from the past week makes it seem as if attackers are flooding networks with cyberattacks targeting the vulnerability in Bash that was disclosed last week. While the attackers haven't wholesale adopted the flaw, there have been quite a few attacks—but the reality is that attackers are treating the flaw as just one of many methods available in their tool kits. One way to get a front-row seat of what the attacks look like is to set up a honeypot. Luckily, threat intelligence firm ThreatStream released ShockPot, a version of its honeypot software with a specific flag, "is_shellshock," that captures attempts to trigger the Bash vulnerability. Setting up ShockPot on a Linux server from cloud host Linode.com is a snap. Since attackers are systematically scanning all available addresses in the IPv4 space, it's just a matter of time before someone finds a particular ShockPot machine. And that was definitely the case, as a honeypot set up by a Dice (yes, yes, we know) tech writer captured a total of seven Shellshock attack attempts out of 123 total attacks. On one hand, that's a lot for a machine no one knows anything about; on the other, it indicates that attackers haven't wholesale dumped other methods in favor of going after this particular bug. PHP was the most common attack method observed on this honeypot, with various attempts to trigger vulnerabilities in popular PHP applications and to execute malicious PHP scripts.

Submission + - Building a Honeypot to Observe Shellshock Attacks in the Real World (dice.com)

Nerval's Lobster writes: A look at some of the Shellshock-related reports from the past week makes it seem as if attackers are flooding networks with cyberattacks targeting the vulnerability in Bash that was disclosed last week. While the attackers haven’t wholesale adopted the flaw, there have been quite a few attacks—but the reality is that attackers are treating the flaw as just one of many methods available in their tool kits. One way to get a front-row seat of what the attacks look like is to set up a honeypot. Luckily, threat intelligence firm ThreatStream released ShockPot, a version of its honeypot software with a specific flag, “is_shellshock,” that captures attempts to trigger the Bash vulnerability. Setting up ShockPot on a Linux server from cloud host Linode.com is a snap. Since attackers are systematically scanning all available addresses in the IPv4 space, it’s just a matter of time before someone finds a particular ShockPot machine. And that was definitely the case, as a honeypot set up by a Dice (yes, yes, we know) tech writer captured a total of seven Shellshock attack attempts out of 123 total attacks. On one hand, that’s a lot for a machine no one knows anything about; on the other, it indicates that attackers haven’t wholesale dumped other methods in favor of going after this particular bug. PHP was the most common attack method observed on this honeypot, with various attempts to trigger vulnerabilities in popular PHP applications and to execute malicious PHP scripts.

Submission + - Intel drops sponsorship of Gamasutra in response to feminist articles

An anonymous reader writes: Processor firm Intel has withdrawn its advertising from Gamasutra in response to the site's decision to carry feminist articles. The articles had drawn the ire of the self-described "Gater" movement, a grass-roots campaign to discredit prominent female games journalists. Intel was apparently so inundated with criticism for sponsoring the Gamasutra site that it had no choice but to withdraw support. An Intel spokesperson explained that "We take feedback from our customers very seriously especially as it relates to contextually relevant content and placements" and as such Gamasutra was no longer an appropriate venue for their products.

Submission + - Hacking USB firmware

An anonymous reader writes: Now the NSA isn't the only one who can hack your USB firmware:

In a talk at the Derbycon hacker conference in Louisville, Kentucky last week, researchers Adam Caudill and Brandon Wilson showed that they’ve reverse engineered the same USB firmware as Nohl’s SR Labs, reproducing some of Nohl’s BadUSB tricks. And unlike Nohl, the hacker pair has also published the code for those attacks on Github, raising the stakes for USB makers to either fix the problem or leave hundreds of millions of users vulnerable.

Personally, I always thought it was insane that USB drives don't come with physical write-protect switches to keep them from being infected by malware.

Submission + - End of an era: After a 30 year run, IBM drops support for Lotus 1-2-3 (theregister.co.uk)

klubar writes: Although it has been fading for years, the final death knell came recently for the iconic Lotus 1-2-3. In many ways, Lotus 1-2-3 launched the PC era (and ensured the Apple II success), and once was a serious competitor for Excel (and prior to that Multiplan and VisiCalc). Although I doubt if anyone is creating new Lotus 1-2-3 spreadsheets, I'm sure there are spreadsheets still being used who trace their origin to Lotus 1-2-3, and even Office 2013 still has some functions and key compatibility with Lotus 1-2-3. Oh, how far the mighty have fallen.
Bug

Xen Cloud Fix Shows the Right Way To Patch Open-Source Flaws 81

darthcamaro writes Amazon, Rackspace and IBM have all patched their public clouds over the last several days due to a vulnerability in the Xen hypervisor. According to a new report, the Xen project was first advised of the issue two weeks ago, but instead of the knee jerk type reactions we've seen with Heartbleed and now Shellshock, the Xen project privately fixed the bug and waited until all the major Xen deployments were patched before any details were released. Isn't this the way that all open-source projects should fix security issues? And if it's not, what is?
Medicine

After Dallas Ebola Diagnosis, CDC Raises Estimate of Patient's Possible Contacts 258

As reported by Bloomberg News, The Washington Post, and other outlets, the Liberian patient whose diagnosis of Ebola infection marks him as the first such case to have been first diagnosed within the United States may have had contact with more people than previously estimated, and 80 people in the Dallas area are now believed to have come into contact with him. While Bloomberg reports that this larger group of potential contacts is "being monitored for symptoms," the Washington Post's slightly later story says that, in keeping with the best current knowledge about Ebola's spread, "Dallas County Health and Human Services Director Zachary Thompson said that these [newly identified contacts] are not being watched or monitored and are not showing any symptoms of the illness. Only the immediate family members of the victim are being regularly monitored for Ebola symptoms; they've been ordered to stay at home and avoid contact with others."
United Kingdom

UK Copyright Reforms Legalize Back-Ups, Protect Parody 68

rastos1 writes A law has come into effect that permits UK citizens to make copies of CDs, MP3s, DVDs, Blu-rays and e-books. Consumers are allowed to keep the duplicates on local storage or in the cloud. While it is legal to make back-ups for personal use, it remains an offence to share the data with friends or family. Users are not allowed to make recordings of streamed music or video from Spotify and Netflix, even if they subscribe to the services. Thirteen years after iTunes launched, it is now legal to use it to rip CDs in the UK. Just as interesting are the ways that the new UK law explicitly, if imperfectly, protects parody.
Australia

How Hackers Accidentally Sold a Pre-Release XBox One To the FBI 67

SpacemanukBEJY.53u (3309653) writes Earlier this week, an indictment was unsealed outlining a long list of charges against a group of men that stole intellectual property from gaming companies such as Epic Games, Valve, Activision and Microsoft. An Australian member of the group, Dylan Wheeler, describes how it was betrayed by an informant working for the FBI, which bought a hardware mockup of an Xbox One that the group built using source code stolen from Microsoft's Game Developer Network Portal. The device, which the FBI paid $5,000 for, was supposed to be sent to the Seychelles, but never arrived, which indicated the hacking collective had a mole.

Submission + - New OS X Backdoor Malware Roping Macs Into Botnet

An anonymous reader writes: New malware targeting Mac machines, opening backdoors on them and roping them into a botnet currently numbering around 17,000 zombies has been spotted. The malware, dubbed Mac.BackDoor.iWorm, targets computers running OS X and makes extensive use of encryption in its routines, Dr. Web researchers noted. What's even more interesting is that it gets the IP address of a valid command and control (C&C) server from a post on popular news site Reddit. The malware is capable of discovering what other software is installed on the machine, opening a port on it, and sending a query to a web server to acquire the addresses of the C&C servers.

Slashdot Top Deals

When it is incorrect, it is, at least *authoritatively* incorrect. -- Hitchiker's Guide To The Galaxy

Working...