Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Chase Letter a perfect phishing template! (Score 1) 180

Got my Chase letter. It warns about not sending information by email. Nothing about not clicking on links. In fact, it contains the lines:

The security of your information is a critical priority to us and we strive to handle it carefully at all times. Please visit our Security Center at chase.com and click on "Fraud Information" under the "How to Report Fraud." It provides additional information on exercising caution when reading e-mails that appear to be sent by us.

chase.com is a link!

All a phisher needs to do is send this exact email, pointing to a dummy Chase page, and encourage the victim to log in when he reaches it.

Clearly they are either very stupid or really just don't care. I'll go for the latter.

Image

Salad Spinner Made Into Life-Saving Centrifuge 87

lucidkoan writes "Two Rice University students have transformed a simple salad spinner into an electricity-free centrifuge that can be used to diagnose diseases on the cheap. Created by Lauren Theis and Lila Kerr, the ingenious DIY centrifuge is cobbled together using a salad spinner, some plastic lids, combs, yogurt containers, and a hot glue gun. The simple and easily-replicated design could be an invaluable tool for clinics in the developing world, enabling them to separate blood to detect diseases like anemia without electricity."
Encryption

Second 3G GSM Cipher Cracked 57

Trailrunner7 writes "A group of cryptographers has developed a new attack that has broken Kasumi, the encryption algorithm used to secure traffic on 3G GSM wireless networks. The technique enables them to recover a full key by using a tactic known as a related-key attack, but experts say it is not the end of the world for Kasumi. Kasumi, also known as A5/3, is the standard cipher used to encrypt communications on 3G GSM networks, and it's a modified version of an older algorithm called Misty. In the abstract of their paper, the cryptographers say the attack can be implemented easily on one standard PC. 'In this paper we describe a new type of attack called a sandwich attack, and use it to construct a simple distinguisher for 7 of the 8 rounds of KASUMI with an amazingly high probability of 214. By using this distinguisher and analyzing the single remaining round, we can derive the complete 128 bit key of the full KASUMI by using only 4 related keys, 226 data, 230 bytes of memory, and 232 time. These complexities are so small that we have actually simulated the attack in less than two hours on a single PC, and experimentally verified its correctness and complexity.'"
Programming

Haskell 2010 Announced 173

paltemalte writes "Simon Marlow has posted an announcement of Haskell 2010, a new revision of the Haskell purely functional programming language. Good news for everyone interested in SMP and concurrency programming."
Programming

The State of Ruby VMs — Ruby Renaissance 89

igrigorik writes "In the short span of just a couple of years, the Ruby VM space has evolved to more than just a handful of choices: MRI, JRuby, IronRuby, MacRuby, Rubinius, MagLev, REE and BlueRuby. Four of these VMs will hit 1.0 status in the upcoming year and will open up entirely new possibilities for the language — Mac apps via MacRuby, Ruby in the browser via Silverlight, object persistence via Smalltalk VM, and so forth. This article takes a detailed look at the past year, the progress of each project, and where the community is heading. It's an exciting time to be a Rubyist."

Comment The discussion misses the point (maybe) (Score 2, Insightful) 251

Infected windows machines are a plague on the internet. Many of these presumably have no useful anti-malware running. Microsoft takes lots of heat, as the comments above prove. So Microsoft decides that trying to sell anti-malware won't work, but maybe giving it away, and I assume bundling it, will get it widely deployed. And take some heat off Microsoft for shipping vulnerable stuff. If this happens, and it works at all, it will be a great improvement to the current mess. To put it differently - it's clearly impossible to make an OS bug proof - so an OS ought to contain defenses against malware out of the box.

Comment This is about DNS, not routing. (Score 1) 264

Lots of misunderstandings in the replies. First - the most common offender is the Hotel's local internet service. Second - this is about DNS, not routing. Windows tries all the DNS servers at once and believes the first positive answer. The DNS servers in the story are the onces the Hotel gave you on the real interface, and the ones VPN gave you on the VPN interface. You can often make this go away by using the advanced settings in the network folder to order the VPN adapter first as a service provider. Failing that, I know of no solution that doesn't require messing with the DNS server entries in the real adapter.

Slashdot Top Deals

Suggest you just sit there and wait till life gets easier.

Working...