Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - Why hackers may be stealing your credit card numbers for years (computerworld.com.au)

angry tapir writes: The PCI Security Standards Council, which develops PCI-DSS, has recommended that merchants switch to using point-to-point encryption to prevent the largescale siphoning of credit card details from point of sale terminals (think Target, Neiman Marcus, Michaels, UPS Store and others). However, retailers often have long technology refresh cycles, so it could be five to seven years before most move to it — not to mention that the fact that PCI-DSS version 3.0 doesn't even mandate the use of point-to-point encryption.
Cloud

Hackers Behind Biggest-Ever Password Theft Begin Attacks 107

An anonymous reader writes Back in August, groups of Russian hackers assembled the biggest list of compromised login credentials ever seen: 1.2 billion accounts. Now, domain registrar Namecheap reports the hackers have begun using the list to try and access accounts. "Overnight, our intrusion detection systems alerted us to a much higher than normal load against our login systems. ... The group behind this is using the stored usernames and passwords to simulate a web browser login through fake browser software. This software simulates the actual login process a user would use if they are using Firefox/Safari/Chrome to access their Namecheap account. The hackers are going through their username/password list and trying each and every one to try and get into Namecheap user accounts." They report that most login attempts are failing, but some are succeeding. Now is a good time to check that none of your important accounts share passwords.
Communications

Tox, a Skype Replacement Built On 'Privacy First' 174

An anonymous reader writes: Rumors of back door access to Skype have plagued the communication software for the better part of a decade. Even if it's not true, Skype is owned by Microsoft, which is beholden to data requests from law enforcement. Because of these issues, a group of developers started work on Tox, which aims to rebuild the functionality of Skype with an emphasis on privacy. "The main thing the Tox team is trying to do, besides provide encryption, is create a tool that requires no central servers whatsoever—not even ones that you would host yourself. It relies on the same technology that BitTorrent uses to provide direct connections between users, so there's no central hub to snoop on or take down."
Communications

Tox, a Skype Replacement Built On 'Privacy First' 174

An anonymous reader writes: Rumors of back door access to Skype have plagued the communication software for the better part of a decade. Even if it's not true, Skype is owned by Microsoft, which is beholden to data requests from law enforcement. Because of these issues, a group of developers started work on Tox, which aims to rebuild the functionality of Skype with an emphasis on privacy. "The main thing the Tox team is trying to do, besides provide encryption, is create a tool that requires no central servers whatsoever—not even ones that you would host yourself. It relies on the same technology that BitTorrent uses to provide direct connections between users, so there's no central hub to snoop on or take down."

Comment Re:$400 per year to use your own money (Score 1) 67

User snaps a photo of it with their smartphone. Bitcoin app on phone decodes it, and sends payment to the address specified.

That just shifts costs from the merchant to the buyer, who now has to pay the telco a recurring fee for a cellular data connection.

And no one is doing that now, without bitcoin. This is like trying to include the cost of an electric generating plant in the price of a toaster.

United States

New Computer Model Predicts Impact of Yellowstone Volcano Eruption 121

An anonymous reader writes Scientists from the U.S. Geological Survey (USGS) have used a program named Ash 3D to predict the impact of a Yellowstone volcano eruption, and found that cities within 300 miles from Yellowstone National Park may get covered by up to three feet of ash. From the article: "Ash3D helped the researchers understand how the previous eruptions created a widespread distribution of ash in places in the park's periphery. Aside from probing ash-distribution patterns, the Ash3D can also be used to identify potential hazards that volcanoes in Alaska may bring."

Comment Re:Desktop (Score 1) 635

In a similar vein... I still like to use a GUI that lets me see more than one window at a time.

Despite all the trendy claims to the contrary, I do not get confused from it, even when they overlap! I must be some sort of genius. I've also found myself able to click on icons and buttons that are smaller than 1/16th of the screen, navigate drop-down menus and even read text composed of characters less than 80 pixels high. I also possess the superhuman ability to notice interface elements that aren't surrounded by vast, empty space.

Interface designers nowadays are the large oafs stomping on my LEGO Technic to offer me a box of DUPLO.

Cloud

New Nigerian ID Card Includes Prepay MasterCard Wallet 62

First time accepted submitter Adam Oxford writes Nigeria's National Identity Management System — which aims to bring together citizen information databases as diverse as driving licenses and tax returns — was introduced last week and includes a prepay MasterCard wallet. Civil liberties groups are naturally wary about the project, but proponents see it as a way to get financial services to the masses. From the article: "The director general of the commission which will implement NIMS, Chris 'E Onyemenam, said at the launch that the card will eventually be used for border control as well. 'There are many use cases for the card, including the potential to use it as an international travel document,' Onyemenam said. 'NIMC is focused on inclusive citizenship, more effective governance, and the creation of a cashless economy, all of which will stimulate economic growth, investment and trade.'"

Submission + - Remote server support and monitoring solution

Crizzam writes: I have about 500 clients which have my servers installed in their data centers as a hosted solution for time & attendance (employee attendance / vacation / etc). I want to actively monitor all the client servers from my desktop, so know when a server failure has occurred. I am thinking I need to trap SNMP data and collect it in a dashboard. I'd also like to have each client connect to my server via HTTP tunnel using something like OpenVPN. In this way I maintain a site-site tunnel open so if I need to access my server remotely, I can. Any suggestions as to the technology stack I should put together to pull off this task? I was looking at Zabbix / Nagios for SNMP monitoring and OpenVPN for the other part. What else should I include? How does one put together a good remote monitoring / access solution that clients can live with and will still allow me to offer great proactive service to my servers located on-site?
Cloud

Reported iCloud Hack Leaks Hundreds of Private Celebrity Photos 336

swinferno writes with news about the leak of hundreds of private celebrity photos over the weekend. Hundreds of revealing pictures of female celebrities were leaked overnight after being stolen from their private collections. Hunger Games actress Jennifer Lawrence, Kirsten Dunst, and pop star Ariana Grande were among the celebrities apparently shown in the pictures, which were posted on infamous web forum 4chan. It's unclear how the images were obtained, but anonymous 4chan users said that they were taken from celebrities' iCloud accounts. The accounts are designed to allow iPhone, iPad, and Mac users to synchronize images, settings, calendar information, and other data between devices, but the service has been criticized for being unreliable and confusing. Earlier this year, Jennifer Lawrence herself complained about the service in an interview with MTV.

Slashdot Top Deals

There are two ways to write error-free programs; only the third one works.

Working...