Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Submission + - Source Code Leaked for Tinba Banking Trojan (threatpost.com)

msm1267 writes: The source code for Tinba, known as the smallest banker Trojan in circulation, has been posted on an underground forum. Researchers say that the files turned out to be the source code for version one of Tinba, which was identified in 2012, and is the original, privately sold version of the crimeware kit.

Tinba performs many of the same malicious functions as other banker Trojans, injecting itself into running processes on an infected machine, including the browser and explorer.exe. The malware is designed to steal financial information, including banking credentials and credit-card data and also makes each infected computer part of a botnet. Compromised machines communicate with command-and-control servers over encrypted channels. Tinba got its name from an abbreviation of “tiny banker”, and researchers say that it’s only about 20 KB in size.

Submission + - Biohackers Are Engineering Yeast to Make THC 1

meghan elizabeth writes: How do you get weed without the weed? By genetically engineering yeast to produce THC, of course.
Once theorized in a stoner magazine column more than a decade ago, a biotech startup working in Ireland is actively trying to transplant the genetic information that codes for both THC and another cannabinoid called CBD into yeast so that "marijuana" can be grown in a lab—no plants necessary.

Submission + - DARPA social media research stirs a murky, controversial pot (networkworld.com)

coondoggie writes: DARPA’s two-year old program to better understand and perhaps ultimately influence social media has begun to bear fruit but some of that harvest is raising a stink. DARPA said when rolling out its Social Media in Strategic Communication (SMISC) program was to develop a social networks science that will develop automated and semiautomated operator support tools and techniques for the systematic and methodical use of social media at data scale and in a timely fashion. But in building that science the agency says it has funded myriad social media/Twitter research (including a study that looked at Lady Gaga’s Twitter following—a model of social media popularity, DARPA stated) as well as a look into Facebook, Twitter, Pinterest, Reddit and Kickstarter.

Submission + - How Google Map Hackers Can Destroy a Business at Will (wired.com)

An anonymous reader writes: Wired reports, "Beneath its slick interface and crystal clear GPS-enabled vision of the world, Google Maps roils with local rivalries, score-settling, and deception. Maps are dotted with thousands of spam business listings for nonexistent locksmiths and plumbers. Legitimate businesses sometimes see their listings hijacked by competitors or cloned into a duplicate with a different phone number or website. In January, someone bulk-modified the Google Maps presence of thousands of hotels around the country, changing the website URLs to a commercial third-party booking site ... Small businesses are the usual targets. .... These attacks happen because Google Maps is, at its heart, a massive crowdsourcing project, a shared conception of the world that skilled practitioners can bend and reshape in small ways using tools like Google’s Mapmaker or Google Places for Business. .... Google has gotten much better at policing malicious edits, to the point where they’re rare today. ... The system has loopholes though, and troves of money-hungry spammers looking for weaknesses. In February, an SEO consultant-turned-whistleblower named Bryan Seely demonstrated the risk dramatically when he set up doppelganger Google Maps listings for the offices of the FBI and Secret Service. Seely channeled the incoming phone calls through to the real agencies while recording them. The stunt got a lot of attention. The Secret Service told Seely he was “a hero” for showing them the vulnerability."

Submission + - Superior Yuytu rover can go conquer Mars (yournewsticker.com)

pesttest writes: Chief designer of the first in the history of space exploration rover Chinese Yuytu Yan Jia (Jia Yang) shared with the publication of his vision Xinhua further development of the national space program. Scientist expressed hope that soon modified version of his brainchild to conquer Mars. “I very much hope that the Chinese will explore....

Submission + - Facebook recruiting Highschool students (engadget.com)

Charliemopps writes: Facebook and other tech firms are hiring ever young and younger talent. But now Facebook is recruiting talent from Highschools and apparently paying as high as $5000 per month for a teenage intern.

Submission + - Can dogs sniff out computer memory like drugs? (providencejournal.com) 1

FriendlySolipsist writes: A dog can be trained to detect computer memory, say the Rhode Island State Police in taking delivery of the second such dog in the nation from the Connecticut State Police. Being able to find hidden computer flash memory cards hidden in drawers and over ceiling tiles will aid their fight against child porn, the police say.

But is there any scientific evidence that such a thing is even possible? Computer parts are made from plastic and metal like almost everything else in a home or office, and computer parts unlike organic plants give off no odor. Without any plausible scientific explanation for how a dog can detect computer parts, is this all just a legal sham to bypass Fourth Amendment probable cause warrant requirements, allowing the human handler to signal the dog based on exactly the kind of "police intuition" that violates constitutional rights?

Comment Re:So how is that going to work (Score 1) 188

> I throw people out of the theatre all day long for using
> their cell phones... There are places it should be legal
> and my business or home is one of them.

Try covering the walls of the theatre room with aluminum foil or tin foil. It's not exactly a new idea http://en.wikipedia.org/wiki/F...
> In 1836, Michael Faraday observed that the excess charge on a charged conductor
> resided only on its exterior and had no influence on anything enclosed within it.
> To demonstrate this fact, he built a room coated with metal foil and allowed
> high-voltage discharges from an electrostatic generator to strike the outside of
> the room. He used an electroscope to show that there was no electric charge
> present on the inside of the room's walls.

Comment People have short memories (Score 1) 231

I'm a fan of pre-Beatles oldies rock music. Every so often, somebody comes up with a "Greatest Hits Of All Time" list, and it usually seems to go back no further than 10 or 15 years before the list was published. Similar for history. Many such lists are better described as "the most influential people of recent times".The most influential people are founders of major movements religions (Jesus, Mohammed, etc) and political ideologies such (Karl Marx, etc)

And then there are leaders of states/empires, who led their empires to triumph/defeat. Too numerous to mention, going back to Biblical times through today

Comment Re:Behind the curve (Score 1) 1040

> Point is, if you don't just grab the cheapest item on the shelf, there is a surprising
> amount of domestically-produced goods in Walmart (excluding clothes).

One thing I've noticed about Walmart is that they seem to be almost the only place here (Toronto, Canada) where you can get neutral-coloured T-shirts that you're not ashamed to wear to work. All other stores have "branding" splattered all over their T-shirts, e.g. Nike "checkmark", Tommy Hilfiger, AeroPostale, etc, etc. I do not want to be a walking billboard for a manufacturer. At least not while I'm paying them for their product.

Comment Re:This "nightmare" rigns a bell (Score 1) 240

> Total BS. Phones should last 20 years. The old land line ones last 20+ years.
> The only thing in a modern phone that doesn't have a 20+ year life span is the
> battery and that is not through not trying.

I got a Nokia 6015i "Candy Bar" phone in 2006. http://nokiamuseum.info/nokia-... Back then, it could talk to the network (Virgin Mobile Canada) over 3 protocols; analog, 1XRTT, and I forget what else. Now the display only shows 1XRTT active.

I rarely use it, so I don't need anything fancier. I'll keep it until my carrier no longer supports it. They've already sent me an offer of a "low-cost upgrade to a faster phone", but I ignored it. With all the buzz about 3G, 4G, 5G, etc, etc, and VOLTE, I don't think 1XRTT will be around several years from now, but I'll cross that bridge when I get to it.

Slashdot Top Deals

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...