Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Patents

Supreme Court Rules In Favor of Patent Troll 87

An anonymous reader writes: The Supreme Court ruled today (PDF) that Cisco Systems can't skip out of a patent suit against them from patent troll Commil USA. The case reached the Supreme Court because Cisco argued it had a "good faith belief" that the patent they were infringing was invalid. The justices voted 6-2 that such a belief didn't matter if they were indeed infringing. The Supreme Court's opinion is that a company must know of the patent it's infringing, and that their product infringes upon the patent — which, at least, is more than what Commil was pushing.

The case isn't completely over — a $63.7 million verdict in Commil's favor was overturned by an Appeals Court, and now the Supreme Court has sent it back down for re-evaluation after it clarified the rules of infringement. The Appeals Court could still overturn the judgment for some other reason. The good news is that the Supreme Court dedicated a page in their opinion to telling lower courts how to sanction patent trolls and keep them from clogging the courts with ridiculous claims. "[I]t is still necessary and proper to stress that district courts have the authority and responsibility to ensure frivolous cases are dissuaded."
Mandriva

Mandriva Goes Out of Business 167

An anonymous reader writes: After struggling for the past several years, Mandriva has finally gone out of business, and is in the process of being liquidated. The company was responsible for Mandriva Linux, itself a combination of Mandrake Linux and Conectiva Linux. When Mandriva fell upon hard times, many of the distro's developers migrated to Mageia Linux, which is still going strong and just putting the final touches on its next major version (5).

Submission + - Apple Facility In Mesa Caught Fire (abc15.com)

jones_supa writes: Officials are on scene of a second-alarm-level fire at the Apple Inc. data center in Mesa. The Mesa Fire Department said that the fire is located near Elliot and Signal Butte Roads in east Mesa. The fire appeared to be on solar panels on the roof of the building over a loading dock. Thick black smoke could be seen raising from the roof. Crews dispatched from multiple locations worked together and knocked the fire down in half an hour. The fire did not appear to be burning inside the building itself, officials said. For now it is unclear what started the fire. A dozen of people had to be evacuated, but there are no reports of any injuries.
Social Networks

Linux/Moose Worm Targets Routers, Modems, and Embedded Systems 110

An anonymous reader writes: Security firm ESET has published a report on new malware that targets Linux-based communication devices (modems, routers, and other internet-connected systems) to create a giant proxy network for manipulating social media. It's also capable of hijacking DNS settings. The people controlling the system use it for selling "follows," "likes," and so forth on social media sites like Twitter, Instagram, Vine, Facebook, and Google+. Affected router manufacturers include: Actiontec, Hik Vision, Netgear, Synology, TP-Link, ZyXEL, and Zhone. The researchers found that even some medical devices were vulnerable to the worm, though it wasn't designed specifically to work with them.

Submission + - Ask Slashdot: Switching careers from software engineering to networking? 1

An anonymous reader writes: I am a software engineer with over 10 years of experience making approx 210k a year after bonus. I've seen countless of software engineering jobs off-shored or taken by H1Bs over the past 5 years. While I am pretty safe at my current job, software engineering as a profession is beginning to look bleak, and i am not even sure if I can ask for the same money if I decide to jump ship to another company (I live in an expensive area).

A friend of mine who works as a network architect with dual CCIEs have no problem finding/landing jobs with high salary. His profession doesn't seem to be affected by outsourcing or H1bs, so I am tempted to switch from my field to networking for better stability and greener pastures.

So the question is, should I do it? The reason why I am looking for the long-term stability is because I've a family of 3 to feed. I cannot afford to be jobless for more than 3 months if I do get laid-off, and software engineering doesn't seem to be the profession after years of observation to provide long-term stability.

Thank you!

Submission + - Insurer denies healthcare breach claim citing lack of minimum required practices (securityledger.com)

chicksdaddy writes: In what may become a trend, an insurance company is denying a claim from a California healthcare provider following the leak of data on more than 32,000 patients. The insurer, Columbia Casualty, charges that Cottage Health System did an inadequate job of protecting patient data.

In a complaint filed in U.S. District Court in California, Columbia alleges that the breach occurred because Cottage and a third party vendor, INSYNC Computer Solution, Inc. failed to follow “minimum required practices,” as spelled out in the policy. Among other things, Cottage “stored medical records on a system that was fully accessible to the internet but failed to install encryption or take other security measures to protect patient information from becoming available to anyone who ‘surfed’ the Internet,” the complaint alleges.

Disputes like this may become more common, as insurers anxious to get into a cyber insurance market that's growing by about 40% annually use liberally written exclusions to hedge against 'known unknowns' like lax IT practices, pre-existing conditions (like compromises) and so on. (http://www.itworld.com/article/2839393/cyber-insurance-only-fools-rush-in.html)

Submission + - Ways to travel faster than light without violating relativity

StartsWithABang writes: It’s one of the cardinal laws of physics and the underlying principle of Einstein’s relativity itself: the fact that there’s a universal speed limit to the motion of anything through space and time, the speed of light, or c. Light itself will always move at this speed (as well as certain other phenomena, like the force of gravity), while anything with mass — like all known particles of matter and antimatter — will always move slower than that. But if you want something to travel faster-than-light, you aren’t, as you might think, relegated to the realm of science fiction. There are real, physical phenomena that do exactly this, and yet are perfectly consistent with relativity.
Security

Exploit Kit Delivers Pharming Attacks Against SOHO Routers 31

msm1267 writes: For the first time, DNS redirection attacks against small office and home office routers are being delivered via exploit kits. French security researcher Kafeine said an exploit kit has been finding success in driving traffic from compromised routers to the attackers' infrastructure. The risk to users is substantial, he said, ranging from financial loss, to click-fraud, man-in-the-middle attacks and phishing.

Submission + - Bogus FBI 'porn warning' scares Android users into ransomware trap (thestack.com)

An anonymous reader writes: Cybercriminals have been targeting Android users in a new ransomware campaign which poses as an email from the FBI warning against viewing porn online. Romanian security software firm Bitdefender suggests that as many as 15,000 spam emails including zipped attachment files were sent to Android customers over the past few days. The attack is thought to have originated in Ukraine. If the files were opened, users were faced with a ransom note demanding $500 to restore full access to their system. It continued to threaten that users who try to unlock their devices would be charged up to $1,500. Payments were requested to be transferred via PayPal My Cash or Money Pak. The ransomware was disguised as an Adobe Flash Player update – a frequent façade used in hacking attacks.
United Kingdom

British Politicians Delete Negative Wikipedia Descriptions Before Election 121

EwanPalmer writes: The Wikipedia pages of dozens of UK politicians had references to sex scandals, fraud and opposition to same sex marriage removed in the run up to the UK general election. Dozens of MPs had negative aspects of their online biographies removed or altered prior to the election in a bid to make them more electable. The changes include several instances of MPs' expense claim scandals being removed, as well as details of arrests and the use of 'chauffeur-driven cars.' The edits were made using computers with IP addresses registered from inside Parliament.

Submission + - Firefox's Optional Tracking Protection Reduces Load Time For News Sites By 44%

An anonymous reader writes: Former Mozilla software engineer Monica Chew and Computer Science researcher Georgios Kontaxis recently released a paper that examines Firefox’s optional Tracking Protection feature. The duo found that with Tracking Protection enabled, the Alexa top 200 news sites saw a 67.5 percent reduction in the number of HTTP cookies set. Furthermore, performance benefits included a 44 percent median reduction in page load time and 39 percent reduction in data usage.

Submission + - Apple and Google attend spy summit in the UK

Presto Vivace writes: APPLE AND GOOGLE JUST ATTENDED A CONFIDENTIAL SPY SUMMIT IN A REMOTE ENGLISH MANSION

The three-day conference, which took place behind closed doors and under strict rules about confidentiality, was aimed at debating the line between privacy and security.

Among an extraordinary list of attendees were a host of current or former heads from spy agencies such as the CIA and British electronic surveillance agency Government Communications Headquarters, or GCHQ. Other current or former top spooks from Australia, Canada, France, Germany and Sweden were also in attendance. Google, Apple, and telecommunications company Vodafone sent some of their senior policy and legal staff to the discussions. And a handful of academics and journalists were also present.

According to an event program obtained by The Intercept, questions on the agenda included: “Are we being misled by the term ‘mass surveillance’?” “Is spying on allies/friends/potential adversaries inevitable if there is a perceived national security interest?” “Who should authorize intrusive intelligence operations such as interception?” “What should be the nature of the security relationship between intelligence agencies and private sector providers, especially when they may in any case be cooperating against cyber threats in general?” And, “How much should the press disclose about intelligence activity?”

The most disturbing part of this is the number of journalists present.

Businesses

Security Researchers Wary of Wassenaar Rules 34

msm1267 writes: The Commerce Department's Bureau of Industry and Security today made public its proposal to implement the controversial Wassenaar Arrangement, and computer security specialists are wary of its language and vagaries. For starters, its definition of "intrusion software" that originally was meant to stem the effect of spying software such as FinFisher and Hacking Team, has also apparently snared many penetration testing tools. Also, despite the Commerce Department's insistence that vulnerability research does not fall under Wassenaar, researchers say that's up for interpretation.
Communications

Academics Build a New Tor Client Designed To Beat the NSA 63

An anonymous reader writes: In response to a slew of new research about network-level attacks against Tor, academics from the U.S. and Israel built a new Tor client called Astoria designed to beat adversaries like the NSA, GCHQ, or Chinese intelligence who can monitor a user's Tor traffic from entry to exit. Astoria differs most significantly from Tor's default client in how it selects the circuits that connect a user to the network and then to the outside Internet. The tool is an algorithm designed to more accurately predict attacks and then securely select relays that mitigate timing attack opportunities for top-tier adversaries.
Privacy

CareFirst Admits More Than a Million Customer Accounts Were Exposed In Security Breach 82

An anonymous reader writes with news, as reported by The Stack, that regional health insurer CareFirst BlueCross BlueShield, has confirmed a breach which took place last summer, and may have leaked personal details of as many as 1.1 million of the company's customers: "The Washington D.C.-based firm announced yesterday that the hack had taken place in June last year. CareFirst said that the breach had been a 'sophisticated cyberattack' and that those behind the crime had accessed and potentially stolen sensitive customer data including names, dates of birth, email addresses and ID numbers. All affected members will receive letters of apology, offering two years of free credit monitoring and identity threat protection as compensation, CareFirst said in a statement posted on its website." Free credit monitoring is pretty weak sauce for anyone who actually ends up faced with identity fraud.

Slashdot Top Deals

Living on Earth may be expensive, but it includes an annual free trip around the Sun.

Working...