Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 23 declined, 13 accepted (36 total, 36.11% accepted)

×
The Military

Submission + - Iran Admits Stuxnet Impacted Their Nuclear Program (guardian.co.uk)

plover writes: According to this article in the Guardian,

Ahmadinejad admitted the worm had affected Iran's uranium enrichment. "They succeeded in creating problems for a limited number of our centrifuges with the software they had installed in electronic parts," the president said. "They did a bad thing. Fortunately our experts discovered that, and today they are not able [to do that] anymore."


Music

Submission + - Jury awards $1.5 million to Capitol Records (kare11.com)

plover writes: In the Jammie Thomas-Rasset case that never ends, a Minneapolis jury has awarded Capitol Records $1.5 million dollars.

Thomas-Rasset is expected to appeal and it the case could wind its way to the Supreme Court.

Submission + - Ars Technica Forums Abused by Phishers

plover writes: Some Ars Technica members received phishing attempts purporting to be from SunTrust this morning. Here's the posting on the Ars forum explaining what happened.

It seems that many users received phishing attempts to Ars only email addresses this morning. We're working on it and will update this post when we find something out.

We believe that our previous forum provider has some exploit that allows people to send messages to private email addresses through their servers. Every report we've seen has originated at one of their web front ends. If we are correct, your email addresses have not been compromised. It's obviously pretty bad to be getting phishing attempts forwarded through someone else, but not quite as bad as if an email DB had been jacked or something.

We have emails out to them. There's a chance we won't hear back for a couple of hours since they're on pacific time, but we're doing what we can.

That's got to be one stupid phisherman to try phishing from the members of Ars Technica.

Submission + - US Admits Most Piracy Estimates Are Bogus

plover writes: According to this article on Ars Technica, the GAO admitted that the estimates of the impact of piracy have no basis in fact.

After examining all the data and consulting with numerous experts inside and outside of government, the Government Accountability Office concluded that it is "difficult, if not impossible, to quantify the economy-wide impacts."

Government

Submission + - Senate Votes to Replace Aviation Radar With GPS (reuters.com) 1

plover writes: The U.S. Senate today passed by a 93-0 margin a bill that would implement the FAA's NextGen plan to replace aviation radar with GPS units. It will help pay for the upgrade by increasing aviation fuel taxes on private aircraft. It will require two inspections per year on foreign repair stations that work on U.S. planes. And it will ban pilots from using personal electronics in the cockpit. This just needs to be reconciled with the House version and is expected to soon become law. This was discussed on Slashdot a few years ago.

Submission + - Do your developers have local admin rights? 6

plover writes: I work as a developer for a Very Large American Corporation. We are not an IT company, but have a large IT organization that does a lot of internal development. In my area, we do Windows development, which includes writing and maintaining code for various services and executables. A few years ago the Info Security group removed local administrator rights from most accounts and machines, but our area was granted exceptions for developers. My question is: do other developers in other large companies have local admin rights to their development environment? If not, how do you handle tasks like debugging, testing installations, or installing updated development tools that aren't a part of the standard corporate workstation?
Security

Submission + - Wal-mart Hacked in 2006, Details in Wired

plover writes: Kim Zetter of Wired documents an extensive hack of Wal-Mart that took place in 2005-2006. She goes into great detail about the investigation and what the investigators found, including that the hackers made copies of their point-of-sale source code, and that they ran l0phtCrack on a Wal-Mart server.

Wal-Mart uncovered the breach in November 2006, after a fortuitous server crash led administrators to a password-cracking tool that had been surreptitiously installed on one of its servers. Wal-Mart’s initial probe traced the intrusion to a compromised VPN account, and from there to a computer in Minsk, Belarus.

Wal-mart has long since fixed the flaws that allowed the compromise, and confirmed that no customer data was lost in the hack.

Security

Submission + - Ex-CIO Blames Microsoft For Security Breach

plover writes: Hannaford is a grocery store chain who lost 4.2 million credit card numbers earlier this year as a result of a security breach. Their former CIO is directly blaming their use of Microsoft as the reason they were breached.

"None of the breach was anything related to Linux. All of it was Microsoft."

Asked whether he believed that Microsoft is less secure because it's truly less secure software or whether its overwhelming marketshare makes it a cyber thief target, Homa said it was the other way around. Microsoft's marketshare is not what attracts so many attackers. "Microsoft is so full of holes. That's why it's still a target," he said.

Security

Submission + - Hannaford's CIO Blames Data Breach on Microsoft (storefrontbacktalk.com)

plover writes: Hannaford is a grocery store chain who lost 4.5 million credit card numbers as a result of a security breach. Their former CIO is directly blaming their use of Microsoft as the reason they were breached.

Homa has become a fan of simplification in battling security. "We used a lot of Linux," Homa said. "None of the breach was anything related to Linux. All of it was Microsoft."

Asked whether he believed that Microsoft is less secure because it's truly less secure software or whether its overwhelming marketshare makes it a cyber thief target, Homa said it was the other way around. Microsoft's marketshare is not what attracts so many attackers. "Microsoft is so full of holes. That's why it's still a target," he said.

Would he counsel other CIOs to avoid Microsoft like the plague? "That's what I'd do. If you limit your exposure to Microsoft, you're going to be in a more secure environment," he said, adding that Microsoft's philosophy is decentralized, forcing IT to manage more points. That means more license fees for Microsoft and more potential security gotchas for the CIO. "Hence, you see my aversion to Microsoft."


Security

Submission + - To Catch A Thief (Use GPS)

plover writes: According to this Star Tribune story, police, with the court's permission, attached a GPS tracking device to a suspect's motorcycle and tracked his activity to the site of a theft. On Monday the thief pled guilty and was sentenced to five years.
United States

Submission + - 'Pre-teens' are now 'pre-criminals'

plover writes:
Wearing a blue suit and a tight smile, the fed faced his audience.
And this wasn't just any audience. It consisted of 300 potential offenders, rounded up on Tuesday so Jon Dudas could lay down the law to them.
In this Star Tribune story, Jon Dudas, the director of the USPTO was speaking to an elementary school assembly of second through fifth graders. So instead of "students" or "kids", it's now acceptable for reporters to refer to them as "potential offenders"? This is plus ungood.

Slashdot Top Deals

So you think that money is the root of all evil. Have you ever asked what is the root of money? -- Ayn Rand

Working...