Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Submission + - This Well-Funded Startup Could Turn Bitcoin Mining On Its Head (itworld.com)

itwbennett writes: A startup company whose backers include Qualcomm, Cisco Systems and a former ARM executive, and which reportedly has raised 'well north of $116 million' has just come out of stealth mode. The first thing to know about the company, which calls itself 21, is that it has designed an embedded chip for bitcoin mining. The details aren’t entirely clear, but the plan seems to be to get its bitcoin mining chip embedded into millions of smartphones and tablets, and for those devices to work collectively to mine new currency. But the company has larger ambitions: It sees its chip as a way to solve the problem of micro payments and it could also be used to pay for the chips themselves.

Submission + - In Desperation, Ransomware Victims Plead with Attackers (itworld.com)

itwbennett writes: Researchers from FireEye recently collected messages from a Web site set up by the creators of a ransomware program called TeslaCrypt to interact with their victims. The messages offer a rare glimpse into the mindset of these cybercriminals and the distress they cause. Among the victims: a father who has been robbed of his baby’s pictures; an employee who lost business files to the malware and now fears losing his job; a housecleaning business set up by maids who can’t afford to pay the ransom.

Submission + - FTC Recommends Conditions for Sale of RadioShack Customer Data (itworld.com)

itwbennett writes: The U.S. Federal Trade Commission has weighed in on the contentious issue of the proposed sale of consumer data by bankrupt retailer RadioShack, recommending that a model be adopted based on a settlement the agency reached with failed online toy retailer Toysmart.com. Jessica L. Rich, director of the FTC’s bureau of consumer protection, said in a letter to a court-appointed consumer privacy ombudsman that the agency’s concerns about the transfer of customer information inconsistent with RadioShack’s privacy promises 'would be greatly diminished' if certain conditions were met, including that the data was not sold standalone, and if the buyer is engaged in substantially the same lines of business as RadioShack, and expressly agrees to be bound by and adhere to the privacy policies.

Submission + - United Launches Bug Bounty, In-Flight Systems Off Limits

itwbennett writes: United Airlines is offering rewards to researchers for finding flaws in its websites but the company will not accept bugs found in onboard Wi-Fi, entertainment or avionics systems, which the U.S. government says may be increasingly targeted by hackers. And as a reward for their efforts, researchers won't get the piles of cash typically associated with such programs, but instead will get miles that can be used for the company’s Mileage Plus loyalty program.

Submission + - Qualcomm Wants To Power The Internet Of Things (itworld.com)

jfruh writes: The Internet Of Things — the world of omnipresent embedded network devices that true believers think is just around the corner — is a potential gold mine to whatever tech vendors can grab an early lead in the market. And Qualcomm thinks it's uniquely positioned to do so, with its solid background in low-powered processors and wireless networking giving it a leg up.

Submission + - China-Based Hackers Used Microsoft's TechNet for Attacks (itworld.com)

itwbennett writes: The China-based hacking group, which security vendor FireEye calls APT17, created accounts on TechNet and then left comments on certain pages. Those comments contained the name of an encoded domain, which computers infected by the group’s malware were instructed to contact. The encoded domain then referred the victim’s computer to a command-and-control server that was part of APT17’s infrastructure, said Bryce Boland, FireEye’s chief technology officer for Asia-Pacific.

Submission + - Apple, A123 To Settle Lawsuit Over Poached Battery Engineers (slashdot.org)

itwbennett writes: Slashdot readers will remember that back in February, electric car battery maker A123 Systems sued Apple for allegedly 'raiding' the Waltham, Massachusetts, company and hiring five employees, including two top-level engineers. The loss of these workers essentially forced A123 to shut down some of its main projects, the suit alleged. Now, according to court documents filed Monday, A123 and Apple 'have reached an agreement, signed a term sheet, and are in the process of drafting a final settlement agreement.'

Submission + - A Year Later, Google Still Not Very Likely To Forget You

itwbennett writes: A year after the European Union’s top court gave Europeans a right to be forgotten by search engines, it is most likely that Google will still remember you after you filed a request to disappear from its search listings. In fact, chances are that the search result you want to have removed when someone Googles your name will stay visible. That happens in almost 60 percent of cases, the company’s online transparency tool showed.

Submission + - Are App Developers Responsible for Decisions Their Users Make? (itworld.com)

itwbennett writes: In a blog post, Rado Kotorov, Chief Innovation Officer at Information Builders asserts that the creators of enterprise apps, not just developers, but anyone who is involved, from defining the concept, to requirements gathering, to final implementation, implicitly assume some of the responsibility for other people’s decision making. Thus, the creators of the app have an ethical obligation to ensure that people can reach the right conclusions from the facts and the way they are presented in the app.

Submission + - Uber Drivers In India Will Start Accepting Cash (itworld.com)

jfruh writes: One of the main selling points of ridesharing services like Uber are that they streamline the payment process: everything is taken care of in the app, which is already linked to your credit card. But in many places in the developing world, most people are unbanked and use only cash, and Uber will have to accommodate them to achieve its global ambitions. Thus, the company is launching a pilot project in India where passengers can pay in cash.

Submission + - MIT Algorithm Banishes Window Reflections In Photos (itworld.com)

itwbennett writes: Researchers at MIT and Google Research have developed a method to automatically remove reflections that appear when shooting photos through glass. The technique finds glass reflections in photos by using the fact that they're usually made up of two reflections, one slightly offset from the other. Since the second reflection is a set distance from the first, the researchers used an algorithm to distinguish the reflections from all the other data in the image.

Submission + - Add GitHub dorking to list of enterprise security concerns (itworld.com)

chicksdaddy writes: IT World has a story today suggesting that GitHub may be a victim of its own success. Exhibit 1: "GitHub dorking:" the use of GitHub's powerful internal search engine to uncover security holes and sensitive data in published code repositories. (http://www.itworld.com/article/2921135/security/add-github-dorking-to-list-of-security-concerns.html)
In a nutshell: GitHub's runaway popularity among developers is putting employers and development shops in a tough spot. As the recent story about Uber accidentally publishing database administrator credentials in a public GitHub repository suggests, (http://arstechnica.com/security/2015/03/in-major-goof-uber-stored-sensitive-database-key-on-public-github-page/), it can be difficult even for sophisticated development organizations to grasp the nuances of how interactions with GitHub's public code repositories might work to undermine corporate security.

The ease with which developers can share and re-use code on GitHub is part of the problem, said Bill Ledingham, chief technology officer at Black Duck Software, which monitors some 300,000 open source software projects that use GitHub. Ledingham said leaked user credentials are inadvertent errors caused by developers too accustomed to the ease with which code can be borrowed, modified and resubmitted to GitHub.

"Developers in some cases are just taking the easiest path forward," he said. "They're checking in code or re-using it and not looking at some of these issues related to security."

Among the issues to watch out for are information leaks by way of vulnerabilities in GitHub.com or the GitHub API, leaks of intellectual property in published repositories and the leak of credentials and other shared secrets that could be used to compromise production applications.

Tools like the GitRob command line application developed by Michael Henriksen (http://michenriksen.com/blog/gitrob-putting-the-open-source-in-osint/) make it a simple matter to analyze all the public GitHub repositories associated with a particular organization. GitRob works by compiling the public repositories belonging to known employees of that firm, then flagging filenames in each repository that match patterns of known sensitive files.

Companies that are doing software development need to take an active interest in GitHub, determining which employees and contractors are using it and verifying that no proprietary code or sensitive information is leaking into the public domain.

Internally, data leak prevention products can identify and block the movement of proprietary code. Concerted education for developers about best practices and proper security hygiene when downloading and uploading code to shared and searchable source repositories can help prevent head slapping mistakes like the leak of database administrator credentials and private keys.

Submission + - GPU Malware Can Also Affect Windows PCs, Possibly Macs (itworld.com)

itwbennett writes: A team of anonymous developers who recently created a Linux rootkit that runs on graphics cards has released a new proof-of-concept malware program that does the same on Windows. A Mac OS X implementation is also in the works. The problem the developers are trying to highlight lies not with the operating systems, such as Windows or Linux, nor with the GPU (graphics processor unit) vendors, but rather with existing security tools, which aren’t designed to scan the random access memory (RAM) used by GPUs for malware code.

Submission + - Proof-of-Concept Linux Rootkit Leverages GPUs for Stealth

itwbennett writes: A team of developers has created a rootkit for Linux systems that uses the processing power and memory of graphics cards instead of CPUs in order to remain hidden. The rootkit, called Jellyfish, is a proof of concept designed to demonstrate that completely running malware on GPUs (graphics processing units) is a viable option. Such threats could be more sinister than traditional malware programs, according to the Jellyfish developers, in part because there are no tools to analyze GPU malware, they said.

Slashdot Top Deals

Understanding is always the understanding of a smaller problem in relation to a bigger problem. -- P.D. Ouspensky

Working...