Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Submission + - Honeywords (informationweek.com)

CowboyRobot writes: Businesses should seed their password databases with fake passwords and then monitor all login attempts for use of those credentials to detect if hackers have stolen stored user information. That's the thinking behind the "honeywords" concept first proposed this month in "Honeywords: Making Password-Cracking Detectable," a paper written by Ari Juels, chief scientist at security firm RSA, and MIT professor Ronald L. Rivest (the "R" in "RSA"). Honeywords aren't meant to serve as a replacement for good password security practices. But as numerous breaches continue to demonstrate, regardless of the security that businesses have put in place, they often fail to detect when users' passwords have been compromised.

Submission + - Dissecting RSA's "Watering Hole" Traffic Snippet (lmgsecurity.com)

rye writes: Even the tiniest snippets of network traffic reveal a lot-- not just about viruses and botnets, but also about the malware research lab setup inside corporations like RSA. Watch as Sherri Davidoff of LMG Security tears apart a teeny tiny snippet of gh0st RAT traffic released by RSA during their investigation of the VOHO "watering hole" attack.

Submission + - DragonFly BSD 3.4 Released, with new packaging system

An anonymous reader writes: DragonFly BSD has released version 3.4. This version is the first BSD to support GCC 4.7, and contains a new experimental Aptitude-like binary package installed called DPorts, which uses the FreeBSD ports collection as a base.

Submission + - Zerocoin Extension To Bitcoin Would Make It Truly Anonymous (forbes.com)

Sparrowvsrevolution writes: Bitcoin, despite what many users think, isn't really anonymous. Every transaction can be traced in the Bitcoin blockchain, making it in some ways even more difficult than traditional money to spend privately. But a group of cryptographers at Johns Hopkins University have come up with Zerocoin, an extension to the cryptographic currency that could make it truly anonymous and untraceable. If enough users adopted Zerocoin, it would represent an upgrade to Bitcoin's code that would allow any user to swap out his or her Bitcoins for Zerocoin tokens at any time and then redeem them for Bitcoins at will, using some clever cryptographic tricks to prevent anyone from tracing the tokens between those two transactions.

Until now, users who wanted to use Bitcoins for anonymous purposes (such as on the drug site Silk Road) have had to run them through a Bitcoin laundry service that mixes Bitcoins randomly to foil surveillance. But that's required depending on potentially shady third parties. Zerocoin would essentially build a laundry system into Bitcoin at the protocol level, without the need to trust anything other than the distributed code itself.

Submission + - How DraStic (DS Emulator for low-power ARM devices) was developped (pandoralive.info)

ekianjo writes: This is an article based on an interview with Exophase (who previously developed gPSP, the famous GBA emulator for PSP) about his latest production: DraStic, a Nintendo DS Emulator working on Open Pandora (an open mini-computer running Linux, based on ARM hardware). It's impressive at many levels since noone thought this would be feasible on such a device until he released the first beta. In the articles he comes back on the development process, the problems with the DS hardware and further optimizations he is considering to reach full speed emulation for all games in the future.

Slashdot Top Deals

Without life, Biology itself would be impossible.

Working...