Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - Cyber criminals tying up emergency phone lines through TDoS attacks, DHS warns (infoworld.com)

tsamsoniw writes: Emergency-service providers and other organizations are being targeted with TDoS (telephony denial of service) attacks, according to a security alert [PDF] from the Department of Homeland Security and the FBI, obtained by security expert Brian Krebs. TDoS attacks use high volumes of automated calls to tie up target phone systems, halting incoming and outgoing calls. Perpetrators are using the attacks to extort cash from target organizations, who receive a call from a representative from a purported payday loan company, who demands payment of $5,000 for an outstanding debt — usually speaking in an unspecified "strong accent."
Cloud

Submission + - One in six Amazon S3 storage buckets are ripe for data-plundering (infoworld.com)

tsamsoniw writes: "Using a combination of relatively low-tech techniques and tools, security researchers have discovered that they can access the contents of one in six Amazon Simple Storage Service (S3) buckets whose owners had them set to Public instead of Private. All told, researchers discovered and explored nearly 2,000 public buckets, according to Rapid 7 Senior Security Consultant Will Vandevanter, from which they gathered a list of more than 126 billion files, many of which contained sensitive information such as source code and personal employee information. Researchers noted that S3 URLs are all predictable and public facing, which make it that much easier to find the buckets in the first place with a scripting tool."
Privacy

Submission + - Twitter-shaming can cost you your job - whether you're giving or receiving (infoworld.com)

tsamsoniw writes: "Hoping to strike a blow against sexism in the tech industry, developer and tech evangelist Adria Richards took to Twitter to complain about two male developers swapping purportedly offensive jokes at PyCon. The decision has set into motion a chain of events that illustrate the impact a tweet or two can make in this age of social networking: One the developers and Richards have since lost their jobs, and even the chair of PyCon has been harassed for his minor role in the incident."
Android

Submission + - Deleted cloud files can be recovered from smartphones, researchers find (infoworld.com)

tsamsoniw writes: "Researchers from the University of Glasgow have discovered that they could fully recover images, audio files, PDFs, and Word documents deleted from Dropbox, Box, and SugarSync, using both an HTC Android smartphone and an iPhone. They created 20 different test files, including Words docs, PDFS, and JPGs, uploaded them via a PC to the various services, and synced the services with the mobile devices. They accessed and manipulated the files in varying ways (e,g accessing them online once, saving them offline), then used a forensics toolkit to attempt to reconstruct files with artifacts saved to the phone."
IT

Submission + - Lawmakers Listen to Opponent of H-1B Visas (computerworld.com)

mk1004 writes: Patrick Thibodeau at ComputerWorld writes that lawmakers are listening, behind closed doors, to business owners who are opposed to bringing in IT workers using H-1B visas. Reducing H-1B IT workers could make careers in IT desirable again, argues one CEO.
The Internet

Submission + - Cyber squatters grab up more than 600 'Pope Francis' domain names (infoworld.com)

tsamsoniw writes: "Although the newly appointed Pope Francis I has proven himself technologically savvy enough to use Twitter, the Vatican dropped the ball when it came to quickly registering a domain name for the pontiff after his appointment earlier this month: Within hours, cyber squatters grabbed up more than 600 domain names containing derivations of the pontiff's name, including popefrancisi.com, popefrancis.co.uk, popefrancis.org, and popefrancis.fr, according to domain-name company names.co.uk."
China

Submission + - U.S. to China: Please stop hacking our companies, if you don't mind (infoworld.com)

tsamsoniw writes: "The U.S. government has at long last called out the Chinese government for tolerating, if not outright supporting, cyber attacks against American businesses. In a speech yesterday, President Barack Obama's National Security Advisor Tom Donilon called on China to acknowledge that cyber crime poses a threat to international trade; to investigate and put a stop to cyber crime emanating from China; and to work with the United States to "establish acceptable norms of behavior in cyberspace." Donilon's speech comes on the heels of a report released by security company Mandiant that laid out evidence of a cyber espionage outfit dubbed APT1 is actually a branch of the Chinese military called PLA (People's Liberation Army) Unit 61398."
Android

Submission + - Gnome co-founder explains why he dumped Linux for Mac (infoworld.com)

tsamsoniw writes: "Miguel de Icaza, co-founder of the Gnome and Mono projects, has revealed that he dumped Linux months ago in favor of Mac OS, citing fragmentation and incompatibilities among the various Linux versions as the reasons for his switch. In a post to his personal blog, he wrote that he has long recommended Macs to new users and has gifted them to friends and family, adding that 'Linux just never managed to cross the desktop chasm.' The Linux Foundation's response: 'We agree with Miguel that Apple makes great products. As to the broader question, we see Linux diversity as its strength rather than a weakness.'"

Submission + - Obama Administration declares 'It's time to legalize cell phone unlocking' (infoworld.com)

tsamsoniw writes: "The Obama Administration and the FCC today came out in favor of changing new legislation that makes it difficult for consumers to unlock their rightfully owned mobile devices — cell phones, smartphones, and tablets — without risk of fines, jail time, or other criminal penalties. The announcements come on the heels of a successful online petition campaign to change a recent Library of Congress ruling made the unlocking of smartphones purchased after Jan. 26 illegal. Notably, neither the White House nor the FCC came out with any definitive recommendations for rewording the Library of Congress's ruling. They said that the Obama administration, Congress, the FCC, and the National Telecommunications and Information Administration (NTIA) need to hash that out."
Data Storage

Submission + - Test your SSDs or risk massive data loss, researchers warn (infoworld.com)

tsamsoniw writes: "Companies adopting flash-based SSDs as a cornerstone to the data center storage systems are risking "massive data loss" due to power outages, according to a new study by researchers from the University of Ohio and HP Labs. In exposing 15 SSDs from five different vendors to power loss, researchers found that 13 suffered such failures as bit corruption, metadata corruption, and total device failure. The paper did not specify which vendors' drives were used."
Microsoft

Submission + - Why a good green tablet computer is hard to find (infoworld.com) 1

tsamsoniw writes: "Green laptops and computers were all the rage not long ago, with hardware makers such as Apple and HP crowing each time they rolled out a new machine that earned an EPEAT Gold rating. Now, though, if you peruse the EPEAT registry for a green "tablet notebook," you'll come up with one listing: the Xplore iX104C5 DMSR. No iPad, no Surface, no Kindle, no Galaxy. So what gives? For starters, the Energy Star spec briefly covered tablets, but not anymore, which means no tablet can be slapped with an Energy Star or EPEAT sticker. Energy Star is working on a new spec that will likely include tablets, while EPEAT is working on new criteria as well. But also potentially problematic is that some vendors — particularly Apple and Microsoft — aren't designing their tablets to be easily repairable, as evidenced by iFixit's Tablet Repairability scorecard. (Dell, by contrast, is doing an admirable job.)"
Microsoft

Submission + - Microsoft stealthily pilots Mac Office and Office 365 accredidation program (infoworld.com)

tsamsoniw writes: "Microsoft has launched a pilot program to train and accredit Apple techs and consultants on Office for Mac and Office 365, but you wouldn't know it from perusing the Microsoft website or even reaching out to the company's public relations team. The Microsoft Office for Mac Accredited Support Professional accreditation is real, though it's currently being pushed only by MacTech, an Apple technology journal that's hosting the program at various events this year. It points to growing acceptance and usage of Mac products in the business world."
Linux

Submission + - Linux-savvy IT pros are in high demand, low supply (infoworld.com)

tsamsoniw writes: "IT professionals with Linux chops — particularly systems administrator — are in high demand and short supply, according to a new survey from Dice. Over 90 percent of hiring managers surveyed said they plan to hire at least one Linux professional in the next six months — though nine out of 10 respondents also said that it's "somewhat difficult" or "very difficult" to find experienced Linux pros. That demand — driven by trends such as open-cloud development, Big Data, and increasing migration to Linux — has helped push the average salary for Linux pros up 9 percent to this past year, to $90,853."

Comment Re:WHAT popular mobile developer Web forum? (Score 4, Informative) 148

According to The New York Times: "But according to a person with knowledge of Facebook’s investigation, the compromised site, iPhonedevsdk, an online forum for software developers, is still infected. (In other words, unless you want to be owned by hackers, do not visit the site.)" http://bits.blogs.nytimes.com/2013/02/19/apple-computers-hit-by-sophisticated-cyberattack/
Microsoft

Submission + - Adobe hopes a pop-up dialog box will thwart Flash attacks via Office docs (infoworld.com)

tsamsoniw writes: "In the wake of the most recent zero-day attacks exploiting Flash Player, Adobe claims that it's worked hard to make Player secure — and that most SWF exploits stem from users opening infected Office docs attached to emails. The company has a solution, though: A forthcoming version of Flash Player will detect when it's being launched from Office and will present users with a dialog box with vague warnings of a potential threat."

Slashdot Top Deals

"May your future be limited only by your dreams." -- Christa McAuliffe

Working...