Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Sandboxing (Score 1) 331

There is a lot of work being done now on behavioral analysis, with some products like Invincea and Cylance based on this idea. From the limited testing that I have done with them, they seem pretty effective. Of course, malware authors could just start changing their behaviors to avoid these tools, but if malware doesn't act like malware anymore, it stops being malware. And of course you forgot reputation services like those already being implemented by browsers and OS vendors. These force malware users to keep moving their sites and C&C around, making it just that much harder. Which is a good thing. Today, what we call "antivirus" is already using these two approaches to some extent.

Comment Re:Oversight and regulation (Score 1) 341

I think the parent's point was that it might be unclear how to find an official taxi in a strange country (what do they look like, how to locate them, etc.), but finding an official Uber taxi is always the same process. I don't think he was knocking Bangkok's official taxis.

Comment Re:Disease - deadly vs wide spread (Score 1) 218

It is unclear (at least to me) how much the alteration of the original pathogen might affect it in other ways. Biology often involves trade-offs. The changes might make it less resistant to current antibiotics, or make it easier for humans to resist naturally. So you could take Ebola and make it airborne somehow, but that change would likely involve tradeoffs that would reduce the impact.

Comment Where is the validation? (Score 4, Informative) 101

Apparently he was able to spoof some control messages to the miners since their only validation was IP address. It is an interesting question: since they should have known about this BGP vulnerability which has been used before, why didn't their minerserver communication have stronger validation? The answer would be, I think, that they didn't bother since it happens so rarely. Probably from now on they will start using another layer of validation. Yet another example of how security happens in the real world: it doesn't get used until the pain gets bad enough.

Comment Re:Where is the private key stored? (Score 1) 175

I had the same thought. I suppose you could store the key encrypted, and then do all the encryption/decryption in the browser. So Yahoo would provide the browser the encrypted key and some Javascript would do the decryption. The article specifically mentions public keys though, which makes me think they must be working on providing a directory of public keys for Yahoo accounts as well. Another option would be using a browser extension. I guess we will find out in time.

Comment Re:Doesn't an orbit require gravity? (Score 1) 54

The ESA overview uses the terms 'orbit' and 'orbiter' many times when describing this craft so I am a little confused. How could Rosetta follow the comet for 15 months, when they had to power it off for years just to get there, if it isn't orbiting the comet? Maybe it is simply sharing the comet's orbit around the sun? Maybe just a difference in what is meant by 'orbit'

Slashdot Top Deals

"Everything should be made as simple as possible, but not simpler." -- Albert Einstein

Working...