Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security

Microsoft Opens Vulnerability Bounty Program For Spartan Browser 53

jones_supa writes: As it did in the past when it tried to make Internet Explorer more secure, Microsoft has launched a new bug bounty program for Spartan browser, the default application of Windows 10 for surfing the information highway. A typical remote code execution flaw can bring between $1,500 and $15,000, and for the top payment you also need to provide a functioning exploit. The company says that it could pay even more than that, if you convince the jury on the entry quality and complexity. Sandbox escape vulnerabilities with Enhanced Protected Mode enabled, important or higher severity vulnerabilities in Spartan or its engine, and ASLR info disclosure vulnerabilities are also eligible. If you want to accept the challenge, Microsoft provides more information on how to participate.

Submission + - Mystery of the coldest spot in the CMB solved

StartsWithABang writes: The cosmic microwave background is a thing of beauty, as not only does its uniform, cold temperature reveal a hot, dense past that began with the hot Big Bang, but its fluctuations reveal a pattern of overdensities and underdensities in the very early stages of the Universe. It’s fluctuations just like these that give rise to the stars, galaxies, groups and clusters that exist today, as well as the voids in the vast cosmic web. But effects at the surface of last scattering are not the only ones that affect the CMB’s temperature; if we want to make sure we’ve got an accurate map of what the Universe was born with, we have to take everything into account, including the effects of matter as it gravitationally grows and shrinks. As we do exactly this, we find ourselves discovering the causes behind the biggest anomalies in the sky, and it turns out that the standard cosmological model can explain it all.

Feed Engadget: Portland unbans UberX (engadget.com)

Citing violations of its hired transportation rules, the city of Portland, OR sued Uber last December and temporarily halted the ridesharing company's operations within city limits. Now, after months of haggling with civic and community leaders, Uber...

Submission + - Microsoft continues earning money from Linux -- increases patent licensing agree (betanews.com) 1

BrianFagioli writes: Many people — let's call them 'haters' — like to make fun of Microsoft's mobile market share with Windows Phone. True, the platform is a failure in this regard, but many users of the OS like it. Quite frankly, besides the lack of apps, Windows Phone is a rather smart and well-designed operating system.

If you choose to laugh at Microsoft over its mobile presence, feel free, but please know that Microsoft is laughing too; all the way to the bank. What you may not know is, Microsoft makes money from Android handset sales thanks to its patent portfolio. In fact, it also collects money from Chromebooks too. In other words, Microsoft is profiting from Linux, since both operating systems are based on the kernel. Today, Microsoft increases its number of patent licensing agreements, by making a deal with Qisda Corp.

Windows

Buggy Win 95 Code Almost Wrecked Stuxnet Campaign 93

mask.of.sanity writes: Super-worm Stuxnet could have blown its cover and failed its sabotage mission due to a bug that allowed it to spread to ancient Windows boxes, malware analysts say. Stuxnet was on the brink of failure thanks to buggy code allowing it to spread to PCs running older and unsupported versions of Windows, and probably causing them to crash as a result. Those blue screens of death would have raised suspicions at the Natanz nuclear lab.
Crime

Allegation: Philly Cops Leaned Suspect Over Balcony To Obtain Password 225

An anonymous reader writes with this news from Ars Technica: If you want access to encrypted data on a drug dealer's digital device, you might try to break the crypto—or you might just try to break the man.

According to testimony from a police corruption trial currently roiling the city of Philadelphia, officers from an undercover drug squad took the latter route back in November 2007. After arresting their suspect, Michael Cascioli, in the hallway outside his 18th floor apartment, the officers took Cascioli back inside. Although they lacked a search warrant, the cops searched Cascioli's rooms anyway. According to a federal indictment (PDF), the officers 'repeatedly assaulted and threatened [Cascioli] during the search to obtain information about the location of money, drugs, and drug suppliers.'
That included, according to Cascioli, lifting him over the edge of his balcony to try to frighten out of him the password to his Palm Pilot. That sounds like a good time for a duress password.

Submission + - Buggy Win 95 code almost wrecked Stuxnet campaign (theregister.co.uk)

mask.of.sanity writes: Super-worm Stuxnet could have blown its cover and failed its sabotage mission due to a bug that allowed it to spread to ancient Windows boxes, malware analysts say. Stuxnet was on the brink of failure thanks to buggy code allowing it to spread to PCs running older and unsupported versions of Windows, and probably causing them to crash as a result. Those blue screens of death would have raised suspicions at the Natanz nuclear lab.
Cellphones

Patents Show Google Fi Was Envisioned Before the iPhone Was Released 31

smaxp writes: Contrary to reports, Google didn't become a mobile carrier with the introduction of Google Fi. Google Fi was launched to prove that a network-of-networks serves smartphone users better than a single mobile carrier's network. Patents related to Google Fi, filed in early 2007, explain Google's vision – smartphones negotiate for and connect to the fastest network available. The patent and Google Fi share a common notion that the smartphone should connect to the fastest network available, not a single carrier's network that may not provide the best performance. It breaks the exclusive relationship between a smartphone and a single carrier. Meanwhile, a story at BostInno points out that Google's not the only one with a network-hopping hybrid approach to phone calls.
Earth

Bees Prefer Nectar Laced With Neonicotinoids 104

Taco Cowboy writes: Neonicotinoids are a class of neuro-active insecticides chemically similar to nicotine. Neonicotinoids kill insects by overwhelming and short-circuiting their central nervous systems (PDF). Shell and Bayer started the development of neonicotinoids back in the 1980s and 1990s. Since this new group of pesticides came to market, the bee population has been devastated in regions where they have been widely used. Studies from 2012 linked neonicotinoid use to crashing bee populations.

New studies, however, have discovered that bees prefer nectar laced with neonicotinoids over nectar free of any trace of neonicotinoids. According to researchers at Newcastle University, the bees may "get a buzz" from the nicotine-like chemicals in the same way smokers crave cigarettes.

Submission + - Cops leaned me over 18th floor balcony to get my password (arstechnica.com)

An anonymous reader writes: If you want access to encrypted data on a drug dealer's digital device, you might try to break the crypto—or you might just try to break the man.

According to testimony from a police corruption trial currently roiling the city of Philadelphia, officers from an undercover drug squad took the latter route back in November 2007. After arresting their suspect, Michael Cascioli, in the hallway outside his 18th floor apartment, the officers took Cascioli back inside. Although they lacked a search warrant, the cops searched Cascioli's rooms anyway. According to a federal indictment (PDF), the officers "repeatedly assaulted and threatened [Cascioli] during the search to obtain information about the location of money, drugs, and drug suppliers."

Submission + - Random generator parodies vapid startup websites (networkworld.com)

alphadogg writes: A pair of Georgia Tech computer science students have created a Random Startup Website Generator http://tiffzhang.com/startup/ that spits out a different jargon-laden startup website every time you click on the URL. Mike Bradley and Tiffany Zhang's random startup website generator "serves as a parody of startups that have websites full of vague praise and little information about their actual business, often because they have little to show in that regard."
Apple

Apple Watch Launches 174

An anonymous reader writes: The Apple Watch's release date has arrived: retailers around the world have quietly begun putting them on their shelves, and customers are beginning to receive their shipments. Reviews have been out for a while, including thoughtful ones from John Gruber and Nilay Patel. Apple has published a full user guide for the software, and iFixit has put up a full teardown to take a look at the hardware. They give it a repairability score of 5 out of 10, saying that the screen and battery are easily replaced, but not much else is. Though Apple designated the watch "water-resistant" rather than "waterproof", early tests show it's able to withstand a shower and a swim in the pool without failing. Ars has an article about the difficulty of making games for the Apple Watch, and Wired has a piece detailing its creation.

Submission + - Pirate Bay Blockade Censors CloudFlare Customers (torrentfreak.com) 1

An anonymous reader writes: The blockade of the Pirate Bay by UK ISPs is causing trouble for CloudFlare customers. Several websites have been inadvertently blocked by Sky because a Pirate Bay proxy is hosted behind the same IP-addresses. In a response, CloudFlare threatened to disconnect the proxy site from its network.

Like any form of censorship web blockades can sometime lead to overblocking, targeting perfectly legitimate websites by mistake.

This is also happening in the UK where Sky’s blocking technology is inadvertently blocking sites that have nothing to do with piracy.

Submission + - A Complete Guide To The 5 Cybersecurity Bills Now Before Congress

blottsie writes: At press time, the House had passed two cybersecurity bills, one Senate bill had been passed out of committee and reported to the full chamber for a final vote, and a third House bill and a second Senate bill were awaiting review by the appropriate committee. The two House bills that passed earlier this week will be combined and sent to the Senate, but the Senate won't take up them up directly; instead, it will vote on its own two bills. It's complicated, so here's a quick breakdown of the key details.

Slashdot Top Deals

"More software projects have gone awry for lack of calendar time than for all other causes combined." -- Fred Brooks, Jr., _The Mythical Man Month_

Working...