Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security

Sun Pushes Emergency Java Patch 90

Trailrunner7 writes "In a sudden about-face, Sun has rushed out a Java update to fix a drive-by download vulnerability that exposed Windows users to in-the-wild malware attacks. The patch comes less than a week after Sun told a Google researcher it did not consider the issue serious enough to warrant an out-of-cycle patch and less than a day after researchers spotted live exploits on a booby-trapped Web site. The flaw, which was also discovered independently by Ruben Santamarta, occurs because the Java-Plugin Browser is running 'javaws.exe' without validating command-line parameters. Despite the absence of documentation, a researcher was about to figure out that Sun removed the code to run javaws.exe from the Java plugin. The about-face by Sun is another sign that some big vendors still struggle to understand the importance of working closely with white hat researchers to understand the implications of certain vulnerabilities. In this case, Google's Tavis Ormandy was forced to use the full-disclosure weapon to force the vendor into a proper response."
Cellphones

Android 2.1 Finally Makes It To Droid 132

MrSmith0011000100110 writes "The lovely people over at AndroidCentral have broken the announcement that Android 2.1 is finally coming to the Motorola Droid, with actual proof on Verizon's Droid support page (PDF). I don't know about my Droid brethren, but I'm pretty excited to see the new series of Android ROMs for the Droid phone that are based on a stock Android 2.1. As most of us know, the existing 2.1 ROMs can be buggy as hell and either running vanilla 2.1 or a custom ROM; but this phone is still a tinkerer's best friend."
Businesses

GameStop, Other Retailers Subpoenaed Over Credit Card Information Sharing 117

New York State's Attorney General, Andrew Cuomo, has subpoenaed a number of online retailers, including GameStop, Barnes & Noble, Ticketmaster and Staples, over the way they pass information to marketing firms while processing transactions. MSNBC explains the scenario thus: "You're on the site of a well-known retailer and you make a purchase. As soon as you complete the transaction a pop-up window appears. It offers a discount on your next purchase. Click on the ad and you are automatically redirected to another company's site where you are signed up for a buying club, travel club or credit card protection service. The yearly cost is usually $100 to $145. Here's where things really get smarmy. Even though you did not give that second company any account information, they will bill the credit or debit card number you used to make the original purchase. You didn't have to provide your account number because the 'trusted' retailer gave it to them for a cut of the action." While there is no law preventing this sort of behavior, Cuomo hopes the investigation will pressure these companies to change their ways, or at least inform customers when their information might be shared.

Comment It'st too late... (Score 1) 141

"The report recommends that an independent advisory body oversee the database, and that laws be passed to limit the uses of the database, while tracking those with access to it, and making misuse of the information a criminal offence." It's too late. You can never put the shit back in the donkey.
Networking

Network Adapter Keeps Talking While a PC Is Asleep 188

Al writes "Researchers at Microsoft and the University of California, San Diego have developed a network adapter that lets a computer enter sleep mode without disrupting the network connection. The adapter, dubbed Somniloquy (meaning to talk in one's sleep), consists of a gumstix running embedded Linux, 64MB of RAM and a 2G SD memory card, connected via USB. The adapter keeps the network connection going and the researchers have also developed a simplified IM client and bittorrent client that carry out more complicated tasks autonomously, only waking the computer if, for example, an actualy IM is received or a download is completed."
Idle

N00b Boyfriend Screenshot-sm 39

He'll probably ask where to find Mankrik's wife at dinner.
Privacy

Submission + - Dayton, OH Police use license plate tracking tech

mechtrader writes: "DAYTON — The Dayton Police Department introduced its newest crime-fighting gadget Tuesday, Aug. 18, and odds are it will soon be introduced to you.

It's a camera and scanner mounted on an officer's cruiser that takes pictures of license plates as officers patrol and inputs the data into a computer program. As the cameras scan plates, a laptop computer inside the officer's cruisers sounds steady beats after each picture is taken. An alarm goes off if the plate or the driver's information is found in a database constantly updated with wanted criminals.

The camera is capable of capturing as many as 10,000 license plates a shift, leaving crime fighters around the area giddy over its capabilities.

------

The concern is not whether the system can identify stolen cars, but whether or not it stores the license plates it reads. What happens when there are 20, or 200, or 2000 cameras instead of two? Can the results of scans from more than one camera be networked to form a comprehensive pictures of who is going where?

Does anyone know the capabilities of these systems and how they are marketed to police?

http://www.daytondailynews.com/blogs/content/shared-gen/blogs/dayton/daytoncrime/entries/2009/08/18/new_police_cameras_will_be_wat.html"
Wireless Networking

Submission + - Major growth of Wi-Fi devices in US

Krokz writes: Network company Meraki has conducted an interesting census about recent changes in Wi-Fi area. Here is 9to5mac article about it:

"The census compared activity seen by a single set of 10,000 randomly selected Meraki wireless access points in North America in 2008 and 2009 in order to understand macro-level traffic and end-user device trends. The number of Apple devices observed, including laptops, iPhones and iPods, grew by an impressive 221%. Apple devices now represent 32% of all the devices seen by this set of Meraki networks in North America, compared to just 14% in 2008. The number of Research In Motion (RIM) devices observed in North America grew by 419% from 2008 to 2009, and Nokia devices grew by 114%. In 2008, RIM devices represented just 2% of all devices observed, but grew dramatically to 8% for 2009. In 2008 and 2009, Nokia represented 1% and 2% of all devices, respectively.

Slashdot Top Deals

What is research but a blind date with knowledge? -- Will Harvey

Working...