Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Privacy

Dutch ISP Discovers 140,000 Customers With Default Password 99

bs0d3 writes "In Holland, a major ISP (KPN) has found a major security flaw for their customers. It seems that all customers have had the same default password of 'welkom01'. Up to 140,000 customers had retained their default passwords. Once inside attackers could have found bank account and credit card numbers. KPN has since changed all the passwords of the 140,000 customers with weak passwords. They also do not believe anyone has actually been burglarized since discovering this weak spot in security."
Canada

Submission + - CIPS chimes in on Internet Preditors Act (www.cips.ca)

alphabet26 writes: The Canadian Information Processing Society has formally responded to the Protecting Children from Internet Predators Act introduced in February of this year. Bill C-30 would grant authorities extended powers to monitor and track Canadians online. In the statement CIPS recommends that the Government of Canada "prohibit access to personal information, related records/data, content, communications or records of internet use without the safeguard of a warrant". CIPS is a non-profit organization that represents Canadian IT professionals and is a member of the International Federation for Information Processing (IFIP).
Biotech

Flesh-eating Bacteria Inspires Highly Selective Instant Adhesive 52

cylonlover writes "A strong and highly selective instant adhesive inspired by the bacterium Streptococcus pyogenes has been developed by Oxford University researchers. S. pyogenes is a common resident of human throats that is normally kept in check by the body's defenses, but when it gets out of control it can cause diseases ranging from strep throat to toxic shock syndrome or flesh-eating disease. By engineering a protein that is central to S. pyogenes' infectious arsenal, the researchers have developed a new superglue that can't be matched for sticking molecules together and not letting go."
China

China's Cyber-Warfare Capabilities Overstated 140

An anonymous reader writes "A new paper argues that China's cyber-warfare capability is actually pretty poor. '[China has] evinced little proficiency with more sophisticated hacking techniques. The viruses and Trojan Horses they have used have been fairly easy to detect and remove before any damage has been done or data stolen. There is no evidence that China's cyber-warriors can penetrate highly secure networks or covertly steal or falsify critical data,' the paper reads (PDF). 'They would be unable to systematically cripple selected command and control, air defense and intelligence networks and databases of advanced adversaries, or to conduct deception operations by secretly manipulating the data in these networks.'"
The Military

Military Labs Develop Caffeinated Jerky and "Zapplesauce" 151

A military research facility outside Boston has come up two new super foods for MREs (Meal, Ready to Eat). Soon soldiers will able to stay awake during guard duty thanks to caffeinated meat sticks. They'll have the energy for extended patrols from a "super-charged" applesauce. From the article: "'There is a lot of science that goes into this,' said David Accetta, a spokesman for the Natick Soldier Research, Development & Engineering Center, where every item put into an MRE is tested and tasted. 'And that’s what a lot of people don’t realize. It’s not just a bunch of cooks in the kitchen making up recipes.'”
Android

Is Tablet Success Bound To Their Crackability? 339

Hitting the front page for the first time, rippeltippel writes "The Economist recently published an article about HP quitting the tablet market. Nothing new I said, until I read 'the announcement showed that the firm had finally seen the light about the tablet market — namely, that there is no such thing.' But are the games closed with the iPad as a clear winner? Possibly not: 'hackers have embraced the Nook, "rooting" its underlying Linux software ... so it can run many more applications from Google's online app store and elsewhere.' A review on Amazon's Kindle tablet page reads: 'They've cracked it — this is the future.' Can it possibly be read as 'Crackable tablets are the future of tablets?'" Smartphone vendors seem to have gotten the message: users want to control the software on their phones. It is a shame that Palm/HP, who were one of the only vendors open from the start, more or less lost the game. Unfortunately it seems that tablet and ebook reader vendors have yet to get the message.
China

EFF Takes On Cisco's Role In China 84

decora writes "Several years ago, writer Du Daobin posted several essays on the internet, protesting such things as unfair taxes and the corruption of the media. He was then charged with 'inciting subversion of state power,' arrested, and after many legal twists and turns, tortured in prison. Daobin, along with several other dissidents with similar stories, decided to sue Cisco Systems (PDF) earlier this year under the legal theory that it aided and abetted China's violation of the Torture Victim Protection Act of 1991. As the case moves forward, the Chinese Ministry of Public Security has stepped up its surveillance, harassment, and interrogation of Daobin and the others. The Electronic Frontier Foundation has now joined the Laogai Research Foundation to draw attention to the case. As part of its opening move, it has asked Cisco to make public statements in support of human rights, hoping that the company's influence with the Chinese government will provide some modicum of protection for the threatened dissidents."
Businesses

LinkedIn Hurries To Address Privacy Stumble 58

swandives writes "LinkedIn will make changes to a 'social advertising' feature that has been criticized for using members' names and photographs in advertisements on its website. Amid mounting criticism, the social networking service says it has been 'listening' to its users and 'could have communicated' its intentions with the new ad feature more clearly. As a result, it said, it will change how the advertisements appear. If a LinkedIn user 'follows' a company or service on LinkedIn, the ad feature can display the user's name and photo in advertisements for that company. LinkedIn said its goal was to deliver more useful ads, but some LinkedIn users complained it was a privacy violation, particularly because they have to opt out of the feature rather than opt in. It will be interesting to see whether the changes affect stocks, especially since the network's IPO in May, when shares closed at more than double the initial price, prompting concerns over another dot-com bubble."
The Military

DARPA Set To Blast Falcon Mach 20 Test Flight 201

coondoggie writes "The Defense Advanced Research Projects Agency is taking to the sky again, this time to run what it says will be the second and final test of its hypersonic Falcon aircraft, which is capable of hitting speeds up to Mach 20, or about 13,000MPH. The Falcon Hypersonic Technology Vehicle 2 is scheduled to launch Wednesday between 7:00am — 1:00 pm PDT from Vandenberg AFB, Calif., aboard an Air Force Minotaur IV rocket. The rocket delivers the Falcon to a starting point high in the atmosphere, where its engine ignite, and, if all goes well, it will blast through the air for about a half hour, DARPA says."
China

China's 5-Year Cyberwar Met With Western Silence 185

jfruhlinger writes "McAfee yesterday outlined what it calls Operation Shady RAT, a five-year campaign of cyberespionage launched by a national government against international organizations and private corporations. That government was almost certainly China's, so the question becomes: why are the Western nations silent about it? One fact revealed by the raids is that, predictions of cyberpunk novels nonwithstanding, private companies are still quite weak in the face of national governments — and it's those national governments that must act against such intrusions."
China

Fake Apple Stores Mushrooming In China 241

siliconbits writes "A new worrying phenomenon has cropped up in China and Apple has been its first victim; meet the first fake Apple Stores, entire buildings that have been designed to look like the real ones. Chinese companies have long been known for being master copiers but this takes the concept of plagiarism and copying to a whole new level. As expected, everything, from the architecture of the building, the colour of the paint, to the products, the T-shirt worn by the staff down to the logo and the badge design come from Cupertino."

Slashdot Top Deals

"God is a comedian playing to an audience too afraid to laugh." - Voltaire

Working...