Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Submission + - Intel to rebrand Atom chips along lines of Core processors (computerworld.com.au)

angry tapir writes: Intel has announced that going forward it will use style of branding for its Atom chips that is similar to its branding for Core chips. Atom CPUs will have the X3, X5 and X7 designations, much like with the Core i3, i5 and i7 brands. An Atom X3 will deliver good performance, X5 will be better and X7 will be the best, an Intel spokeswoman said.

Submission + - Europol and security vendors disrupt massive Ramnit botnet (computerworld.com.au)

angry tapir writes: European law enforcement agencies have seized command-and-control servers used by Ramnit, a malware program that steals online banking credentials, FTP passwords, session cookies and personal files from victims. Ramnit started out in 2010 as a computer worm capable of infecting EXE, DLL, HTM, and HTML files. However, over time it evolved into an information-stealing Trojan that's distributed in a variety of ways.

Submission + - Australian ISPs to introduce '3-strike' style anti-piracy scheme (computerworld.com.au)

angry tapir writes: Australian ISPs are considering a draft industry code, developed in response to government threats to step in and do it for them, that will implement a 'three notice' scheme for alleged copyright infringement. If an ISP customer gets three notices in 12 months, a rights holder can go to court to obtain their details and potentially take legal action against them. (The other part of the government's copyright crackdown is the introduction of a scheme to have pirate websites blocked — the government has yet to introduce the legislation for it, however.)

Submission + - Silverlight exploits up, Java down, Cisco reports (computerworld.com.au)

angry tapir writes: Attempts to exploit Silverlight soared massively in late 2014 according to research from Cisco. However, the use of Silverlight in absolute terms is still low compared to the use of Java and Flash as an attack vector, according to Cisco's 2015 Annual Security Report. The report's assessment of the 2014 threat landscape also notes that researchers observed Flash-based malware that interacted with JavaScript. The Flash/JS malware was split between two files to make it easier to evade anti-malware protection. (The full report is available here [registration required].)

Submission + - Microsoft researchers use light beams to charge smartphones (computerworld.com.au) 1

angry tapir writes: A group of Microsoft researchers has built a prototype charger for smartphones that can scan a room until it locates a mobile device compatible with the system and then charge the handset using a light beam. The researchers say they can achieve efficiency comparable to conventional wired phone chargers. The biggest barrier? Smartphones don't (yet) come with solar panels attached.

Submission + - U.S. government lurked on Silk Road for over a year (computerworld.com.au)

angry tapir writes: In order to build a case against the notorious Silk Road underground marketplace, a team of U.S. law enforcement agencies spent well over a year casing the site: buying drugs, exchanging Bitcoins, visiting forums and even posing as a vendor, although they did stop short of selling any illicit goods. From March 2012 until September 2013, Federal agents closely tracked the site, making over 50 drug purchases, according to Jared DerYeghiayan, an agent with the Department of Homeland Security who was part of a special investigation unit looking into the site.

Submission + - UK prime minister suggests banning apps that support encrypted communications (computerworld.com.au)

angry tapir writes: The U.K. may ban online messaging services that offer encryption such as WhatsApp and Apple's iMessage, under surveillance plans laid out by Prime Minister David Cameron. Services that allow people to communicate without providing access to their messages pose a serious challenge to law enforcement efforts to combat terrorism and other crimes, Cameron said Monday. He didn't name specific apps, but suggested those with encryption would not jive with new surveillance legislation he's looking to enact if he gets reelected this year.

Submission + - Hands on with MakerBot's 3D printed wood (computerworld.com.au)

angry tapir writes: 3D printing has lost its novelty value a bit, but new printing materials that MakerBot plans to release will soon make it a lot more interesting again. MakerBot is one of the best-known makers of desktop 3D printers, and at CES this week it announced that late this year its products will be able to print objects using composite materials that combine plastic with wood, metal or stone.

Submission + - Microsoft to open source cloud framework behind Halo 4 services (computerworld.com.au)

angry tapir writes: Microsoft plans to open-source the framework that helps developers of cloud services like those behind Halo 4. Project Orleans is a framework built by the eXtreme Computing Group at Microsoft Research using .NET, designed so developers who aren't distributed systems experts can build cloud services that scale to cope with high demand and still keep high performance. The Orleans framework was used to build several services on Azure, including services that are part of Halo 4. The code will be released under an MIT license on GitHub early next year.

Submission + - Australia pushes ahead with website blocking in piracy fight (computerworld.com.au)

angry tapir writes: As part of its crackdown on unauthorised downloading of copyright material, the Australian government will push ahead with the introduction of a scheme that will allow rights holders to apply for court orders to force ISPs to block websites. (Previously Slashdot noted that the Australian government had raised such a scheme as a possibility)

Submission + - POODLE flaw returns, this time hitting TLS security protocol (computerworld.com.au)

angry tapir writes: If you patched your sites against a serious SSL flaw discovered in October you will have to check them again. Researchers have discovered that the POODLE vulnerability also affects implementations of the newer TLS protocol. The POODLE (Padding Oracle On Downgraded Legacy Encryption) vulnerability allows attackers who manage to intercept traffic between a user's browser and an HTTPS (HTTP Secure) website to decrypt sensitive information, like the user's authentication cookies.

Submission + - North Korea denies involvement in 'righteous' Sony hack (computerworld.com.au)

angry tapir writes: North Korea's government has denied any involvement in the attack on Sony Pictures, but in a statement indicated that it's not necessarily unhappy that it happened. In a statement, the country's powerful National Defence Commission, which controls North Korea's armed forces, said it had no knowledge of the attack.

Submission + - MasterCard rails against Bitcoin's (semi-)anonymity (computerworld.com.au)

angry tapir writes: MasterCard has used a submission to an Australian Senate inquiry to argue for financial regulators to move against the pseudonymity of digital currencies such as Bitcoin. "Any regulation adopted in Australia should address the anonymity that digital currency provides to each party in a transaction," the company's told the inquiry into digital currencies. MasterCard believes that "all participants in the payments system that provide similar services to consumers should be regulated in the same way to achieve a level playing field for all."

Slashdot Top Deals

Love may laugh at locksmiths, but he has a profound respect for money bags. -- Sidney Paternoster, "The Folly of the Wise"

Working...