Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - Snowden Used Low-Cost Tool to Best N.S.A. (nytimes.com)

mendax writes: The New York Times is reporting, 'Intelligence officials investigating how Edward J. Snowden gained access to a huge trove of the country’s most highly classified documents say they have determined that he used inexpensive and widely available software to “scrape” the National Security Agency’s networks, and kept at it even after he was briefly challenged by agency officials.

Using “web crawler” software designed to search, index and back up a website, Mr. Snowden “scraped data out of our systems” while he went about his day job, according to a senior intelligence official. “We do not believe this was an individual sitting at a machine and downloading this much material in sequence,” the official said. The process, he added, was “quite automated.”

The findings are striking because the N.S.A.’s mission includes protecting the nation’s most sensitive military and intelligence computer systems from cyber attacks, especially the sophisticated attacks that emanate from Russia and China. Mr. Snowden’s “insider attack,” by contrast, was hardly sophisticated and should have been easily detected, investigators found.'

Submission + - LA building's lights interfere with cellular network, FCC says (networkworld.com) 5

alphadogg writes: When a certain Los Angeles office building lights up, it's a dark day for nearby cellphone users, according to the Federal Communications Commission. Fluorescent lights at Ernst & Young Plaza, a 41-story tower near the heart of downtown, emit frequencies that interfere with the Verizon Wireless 700MHz network, the agency said in a citation issued against the building owner. The FCC's message comes through loud and clear in the filing: the building owner could be fined up to $16,000 a day if it keeps using the interfering lights, up to a total of $112,500. The alleged violation could also lead to "criminal sanctions, including imprisonment," the citation says.

Submission + - ReactOS 0.3.16, the Windows clone has got a new Explorer (kingofgng.com)

KingofGnG writes: On the long, long road that leads to its final target, ReactOS continues to grow and evolve thanks to the hard work made by developers contributing to the project. The latest, important changes help the system to actually advance toward the aforementioned final target, ie to reach full compatibility with software and drivers made for Windows operating systems based on the NT architecture.

Submission + - Is Whitelisting The Answer To The Rise In Data Breaches? (forbes.com)

MojoKid writes: It doesn’t take a rocket scientist to figure out that cyber criminals are quickly getting more sophisticated than current security, intrusion detection and prevention technology can defend against. And you have to wonder if the computer security industry as a whole is willing to take the disruptive measures required to address the issue head-on. One way to tackle the surging data breach epidemic is with a technology called “whitelisting.” It’s not going to sound too sexy to the average end user and frankly, even CIOs may find it unfashionable but in short, whitelisting is a method of locking-down a machine such that only trusted executables, DLLs and other necessary system and application components are allowed to run – everything else is denied. A few start-up security companies are beginning to appear in this space. The idea is to start with a known, clean system installation and then lock it down in that state so absolutely nothing can be changed. If you follow system security, regardless of your opinion on the concept of whitelisting, it’s pretty clear the traditional conventions of AV, anti-malware, intrusion detection and prevention are no longer working.

Comment Re: If you like it (Score 1) 171

You blame him for the health insurance providers taking the opportunity to use him as a whipping boy and take out their aggravation that their golden goose isn't looking too healthy?

In other news, Reagan said that trickle-down economics would work, and George W. showed up on an aircraft carrier claiming victory over a war that wasn't over yet, which we started because of falsified intel. Clinton said he didn't have sex with that woman, either.

Comment Re: And That, Ladies and Gentlemen ... (Score 4, Insightful) 194

Your theory flies in the face of history. Spam now represents the majority of email sent and they only need a fraction of a percent in return in order to reap a significant reward to justify their efforts. This particular clever exploit has been around how long undetected? And all they have to do is take the same code and inject it into the next extension they buy, or roll out. This is even better than spam.

Google's main reason for getting involved in this one is that it's leeching off of their core business. I guarantee that's not something they'll let slide.

Comment Re: RSA sold you out (Score 1) 464

If my entropy is real then knowing the algorithm doesn't help. The problem with the dual elliptical approach used by the spec was that the "randomness" was baked in, and then made to be the default used by RSA. The spec actually allowed for users to change the baked-in numbers; this hack by the NSA relied on success through the ignorance of customers rather than real cryptography. More social engineering than computer engineering.

Slashdot Top Deals

Math is like love -- a simple idea but it can get complicated. -- R. Drabek

Working...