Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - Mt. Gox kept exchange open despite knowledge of large-scale theft, filing sugges (computerworld.com.au)

angry tapir writes: Mt. Gox may have collected a large sum in trading fees in the weeks before its closure, even though it was already aware that a vast number of bitcoins had gone missing, its U.S. bankruptcy filing suggests. A sworn declaration in the filing from Robert Karpeles, Mt. Gox 's CEO, reveals that the Bitcoin exchange knew in early February that its situation was far graver than it had disclosed at the time.

Submission + - Large DDoS attack brings WordPress pingback abuse back into spotlight (cso.com.au)

angry tapir writes: Attackers have abused the WordPress pingback feature, which allows sites to cross-reference blog posts, to launch a large-scale, distributed denial-of-service (DDoS) attack, according to researchers from Web security firm Sucuri. The attack involved over 162,000 legitimate WordPress websites being forced to send hundreds of requests per second to a popular WordPress site, preventing access to it for many hours. The attack exploited an issue with the XML-RPC (XML remote procedure call) implementation in WordPress that's used for features like pingback, trackback, remote access from mobile devices and others, and brought back into the spotlight the denial-of-service risks associated with this functionality that have been known since 2007.

Submission + - Thanks a million, Drupal! (computerworld.com.au)

angry tapir writes: Drupal, an open source content management system, now powers more than 1 million websites, according to figures released today. As of 15 February, 1,005,489 websites were powered by the CMS, according to the Drupal Association, a non-profit organisation that stewards the project. It's heady stuff for an open source project born out of the desire of its creator, Dries Buytaert, to experiment with Web technologies.

Submission + - Is RSA's Chairman Art Coviello in denial? (cso.com.au)

angry tapir writes: In an interview given to the Australian media at RSA Conference this week, RSA Chairman Art Coviello said "It is against the law for the NSA to spy in the US and if they've done anything illegal, which, again, within US law, people might have commented that they have in the press, but no legal authority seems to be raising that as an issue." It's clear that Coviello has either not kept up with what's been going on, is in denial or deliberately attempting to mislead.

Submission + - ICANN considers using '127.0.53.53' to tackle DNS namespace collisions (computerworld.com.au) 1

angry tapir writes: As the number of top-level domains undergoes explosive growth, the Internet Corporation for Assigned Names and Numbers (ICANN) is studying ways to reduce the risk of traffic intended for internal network destinations ending up on the Internet via the Domain Name System. Proposals in a report produced on behalf of ICANN include preventing .mail, .home and .corp ever being Internet TLDs; allowing the forcible de-delegation of some second-level domains in emergencies; and returning 127.0.53.53 as an IP address in the hopes that sysadmins will have a WTF moment and Google it.

Submission + - Hackers circulate thousands of FTP credentials, New York Times among those hit (computerworld.com.au)

angry tapir writes: Hackers are circulating credentials for thousands of FTP sites and appear to have compromised file transfer servers at The New York Times, UNICEF and other organizations, according to a security expert. The hackers obtained credentials for more than 7000 FTP sites and have been circulating the list in underground forums, said Alex Holden, chief information security officer for Hold Security, a Wisconsin-based company that monitors cyberattacks.

Submission + - Australian police deploy 3D crime scene scanner (computerworld.com.au) 1

angry tapir writes: Police in the Australian state of Queensland will employ a handheld laser scanner that can be used to map crime scenes, including in areas where there is no GPS reception. The police will use the Australian developed Zebedee laser scanner: A LiDAR scanner that is mounted on a spring. As a user walks around, the spring moves and the scanner captures the surrounding area. Software processing then uses the data to construct a 3D model. Previously the technology has been used to capture areas of cultural significance, such as the interior of the Leaning Tower of Pisa. As an added bonus, the Zebedee looks ridiculous when in use.

Submission + - Chromebooks getting VMware virtual desktop service (computerworld.com.au)

angry tapir writes: VMware will offer virtual desktop services for Google's Chromebooks, allowing them to run Windows applications on the pared-down laptops based on the Chrome OS. Organizations could save as much as US$5,000 per computer by using a combination of Chromebooks and VMware managed services, Google has estimated.

Submission + - LinkedIn ditches feature that was a 'dream for attackers' (computerworld.com.au)

angry tapir writes: LinkedIn is shutting down Intro, its recently launched mobile service for connecting people over email, that raised security concerns. Intro was launched last October and described at the time as a 'dream come true for hackers' The service was made for the iPhone, and was designed to grab LinkedIn profile information and insert it into emails received on phones. The service displayed that information to the recipient from the email's sender if the sender was also on LinkedIn.

Submission + - Oracle broadens legal fight against third-party Solaris support providers (computerworld.com.au) 1

angry tapir writes: Oracle is continuing its legal battle against third-party software support providers it alleges are performing such services in a manner that violates its intellectual property. Last week, Oracle sued StratisCom, a Georgia company that offers customers support for Oracle's Solaris OS, claiming it had "misappropriated and distributed copyright, proprietary software code, along with the login credentials necessary to download this code from Oracle's password-protected websites."

Submission + - Security vendors self-censor Target breach details (computerworld.com.au)

angry tapir writes: At least three security companies have scrubbed information related to Target from the Web, highlighting the ongoing sensitivity around one of the largest-ever data breaches. How hackers broke into Target and installed malware on point-of-sale terminals that harvested up to 40 million payment card details is extremely sensitive. Now, details that give insight into the attack are being hastily removed or redacted by security companies.

Submission + - Target-related malware was a side job for man living in Russia (computerworld.com.au)

angry tapir writes: In a surprising TV interview, a 23-year-old living in Russia said he helped code a software program that experts believe was eventually modified to steal tens of millions of payment card details from Target. Rinat Shabayev, who lives in Saratov, Russia, told Lifenews.ru that the program has a defensive purpose of finding software problems but could have been abused by criminals. The news outlet characterized his work on the program as a side job, quoting him as saying, "I am trying to find work. I want to find a normal and stable job and time to start my own business."

Submission + - Target credit card data was sent to server in Russia (computerworld.com.au)

angry tapir writes: The stolen credit card numbers of millions of Target shoppers took an international trip — to Russia. A peek inside the malicious software that infected Target's POS (point-of-sale) terminals is revealing more detail about the methods of the attackers as security researchers investigate one of the most devastating data breaches in history. Findings from two security companies show the attackers breached Target's network and stayed undetected for more than two weeks. Over two weeks, the malware collected 11GB of data from Target's POS terminals. The data was first quietly moved to another server on Target's network and then transmitted in chunks to a U.S.-based server that the attackers had hijacked. Logs from that compromised server show the data was moved again to a server based in Russia starting on Dec. 2.

Submission + - California court dismisses Google Glass traffic ticket (computerworld.com.au)

angry tapir writes: A court in Southern California has dismissed what was apparently the first-ever traffic citation issued for wearing Google Glass while driving. Cecilia Abadie was stopped for speeding in late October. When a California Highway Patrol officer approached her, he noticed she was wearing the Google Glass device and issued a second ticket for that. However a court commissioner in San Diego dismissed the Google Glass ticket, saying he could find no evidence that the device was in use while Abadie was driving

Slashdot Top Deals

"A car is just a big purse on wheels." -- Johanna Reynolds

Working...