Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Wrong. (Score 1) 223

"open, widely used and available"
Yeahhh... No.
So Perl, Python ?
Military systems have life spans of decades. What is widely used today is a niche tomorrow. When Ada was first specified about the only languages that fit your requirements where COBOL and FORTRAN. If you want to stretch it a bit you might include Pascal.
This was 1977 after all.
Ada actually fits your requirements pretty well. Most new systems are now using C++ but Ada is an interesting language for writing highly reliable systems.

Comment Re:Good (Score 1) 223

I have to say that while I do not extremists groups of any type your examples leave me wondering.
Violet Blue is not a well known security expert she is sex columnist. I also think that you in the context of computer security least she is not highly respected. I can seen the logic in the statement that a sex talk has no place in a computer security conference.

Submission + - Researchers Use ZigBee Sniffing Drone to Find, Fingerprint, and Map IoT Devices (praetorian.com)

pjauregui writes: Today, security researchers at Praetorian released a new interactive map that showcases exposed and potentially vulnerable Internet of Things (IoT) devices in major cities. If you’re familiar with SHODAN, which allows you to search for open ports on industrial networks, Praetorian is applying a similar idea to IoT devices operating in residential, commercial, and industrial zones. The project just started, so right now it’s limited to Austin, but they’ve already mapped over 1,500 unique devices in that one city and the goal is to quickly expand this to other major metro areas across the US. They also show manufacturer statistics, such as how many Phillips Hue lighting devices were found in the sample set they released.

To do this, they’re using a customized IoT-hunting drone that’s specially equipped to ‘sniff’ out ZigBee IoT beacons. Once a device is discovered, it's then analyzed to determine its security settings, manufacturer ID, channel, extended source, and other unique attributes of the device. Here’s a link to the real-time map they have for the Austin area: https://www.praetorian.com/iotmap/

Based on the data released, security itself doesn't seem to be at the heart of the project at this point. At its core, the project is currently "driven by exploration" and discovery in the IoT space. Though it does appear that the project will take a heavier security-focus at some point:

According to Gartner, 4.9 billion connected things will be in use during 2015, up 30 percent from 2014, and will reach 25 billion by 2020. In today’s connected world, the perception of security risk alone, even if not realized, can still negatively impact consumer confidence necessary for new technologies to meet their full market potential. Recent, high-profile data breaches have heightened consumers’ awareness of data security and privacy issues. As a result, consumer adoption may suffer until vendors can adequately address security and privacy concerns. Joining the Internet of Things adds many new layers of complexity for any product environment. New technologies, existing technologies working together in new ways, limited standards, and competing protocols all add to the challenge of delivering a secure connected product to the market. From smart homes, connected lighting, smart grids and retail services to connected cars, industrial automation, and physical plant operation, Internet of Things security testing and assurance is critical for delivering and deploying secure connected products. We'll be sharing a lot more about IoT security as the project evolves.


Yahoo!

Hackers Exploit Adobe Flash Vulnerability In Yahoo Ads 77

vivaoporto notes a report that a group of hackers have used online ad networks to distribute malware over several of Yahoo's websites. The attack began on Tuesday, July 28, and was shut down on Monday, August 3. It was targeted at Yahoo's sports, finance, gaming, and news-related sites. Security firm Malwarebytes says the hackers exploited a Flash vulnerability to redirect users to the Angler Exploit Kit. "Attacks on advertising networks have been on the rise ... researchers say. Hackers are able to use the advertising networks themselves, built for targeting specific demographics of Internet users, to find vulnerable machines. While Yahoo acknowledged the attack, the company said that it was not nearly as big as Malwarebytes had portrayed it to be."

Comment Re:Remember when the Internet was uncontrolled? (Score 3, Interesting) 121

The EU isn't a defensive alliance; that's what NATO is for and Turkey is already a NATO member. One that's keeping us from forming a coherent policy against ISIS, incidentally, since our natural allies in the region and only proven effective anti-ISIS force happen to be Turkey's sworn enemy.

Comment Remember when the Internet was uncontrolled? (Score 5, Insightful) 121

When USENET, IRC, and other mediums that were hard to censor were the rule rather than the exception? Now the "go to" places are all for profit enterprises, Facebook, Twitter, Google, et. al. They may profess to follow Western ideals, they may even actually believe in them, but when push comes to shove they'll always do what's necessary to enrich the bottom line.

As an aside, I wonder why the EU is hesitant to consider admitting Turkey? Or why the United States insists on advocating in favor of such a course of action.

Social Networks

Facebook Allows Turkish Government To Set the Censorship Rules 121

New submitter feylikurds writes: Facebook has been blocking and banning users for posting Kurdish or anti-Turkish material. Many screenshots exists of Facebook notifying people for such. You can insult any single historical figure that you like on Facebook except one: Turkey's founder Mustafa Kemal 'Ataturk'. However, he should not receive special treatment and be protected from criticism, but rather should be treated and examined like everyone else. In order to be accessible within Turkey, Facebook has allowed the repressive Turkish government to set the censorship rules for billions of their users all around the globe. Facebook censors Kurds on behalf of Turkey. To show the world how unjust this policy is, this group discusses Facebook's censorship policy as it relates to Kurds (Facebook account required) and how to get Facebook to change its unfair and discriminatory policy. Makes re-reading Hossein Derakhshan's piece worth the time.

Comment Re:Landmines for peace (Score 1) 262

I was implicitly pointing out that landmines have certain inherent qualities that makes them worth considering despite past instances of civilian causalities--causalities that could easily be minimized given a different context (strategic placement in a first-world nation instead of scattershot tactical placement in a third world nation.)

Automated weapons, it should be noted, generally lack this capability. I suppose that stationary turrets (of the sort that couldn't be trivially moved) could be useful but they are not at all militarily decisive or game-changing given how expensive and vulnerable they are (relative to mines.)

Again, landmines were brought up as a comparison. I was pointing out that this comparison was flawed and landmines in fact had a number of redeeming qualities that (I thought it unnecessary to highlight) automated weapons simply do not match.

Comment Re:Landmines for peace (Score 1) 262

Militaries do not clear modern minefields in minutes. That's complete nonsense. At best with hours or days of intense effort you might clear a narrow pathway, but that still puts you at a significant disadvantage as the defender can simply direct all of their air power and artillery at the pathway.

You furthermore are shifting the hypothetical into an all-out war including the potential use of nukes, when I was clearly talking about Ukraine-type situations, where force is limited and Russian deniablity (however laughable) was heavily utilized.

Also, I didn't cover this but tactical nuclear landmines are a very interesting (although politically very tricky to sell) strategy, which could even serve the dual purpose getting rid of some of the world's ICBMs.
Botnet

Cleaning Up Botnets Takes Years, May Never Be Completed 74

Once a botnet has taken root in a large pool of computers, truly expunging it from them may be a forlorn hope. That, writes itwbennett, is: the finding of researchers in the Netherlands who analyzed the efforts of the Conficker Working Group to stop the botnet and find its creators. Seven years later, there are still about 1 million computers around the world infected with the Conficker malware despite the years-long cleanup effort. 'These people that remain infected — they might remain infected forever,' said Hadi Asghari, assistant professor at Delft University of Technology in the Netherlands. The research paper will be presented next week at the 24th USENIX Security Symposium in Washington, D.C. (And "Post-Mortem of a Zombie" is an exciting way to title a paper.)

Slashdot Top Deals

It is easier to write an incorrect program than understand a correct one.

Working...