Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Microsoft

Microsoft Issuing Unusual Out-of-Band Security Update 156

wiredmikey writes "In a rare move, Microsoft is breaking its normal procedures and will issue an emergency out-of-band security update on Thursday to address a hash collision attack vulnerability that came into the spotlight yesterday, and affects various Web platforms industry-wide. The vulnerability is not specific to Microsoft technologies and has been discovered to impact PHP 5, Java, .NET, and Google's v8, while PHP 4, Ruby, and Python are somewhat vulnerable. Microsoft plans to release the bulletin on December 29, 2011, at 10:00 AM Pacific Time, and said it would addresses security vulnerabilities in all supported releases of Microsoft Windows. 'The impact of this vulnerability is similar to other Denial of Service attacks that have been released in the past, such as the Slowloris DoS or the HTTP POST DoS,' said security expert Chris Eng. 'Unlike traditional DoS attacks, they could be conducted with very small amounts of bandwidth. This hash table multi-collision bug shares that property.'"

Comment This is Rachael from Card Services (Score 1) 228

Mostly from Rachael at Card Services, calling about my account. I press 1 to speak with an agent and ask which account, and they hang up on me. I'm glad the car extended warranty calls have stopped. Now if I could end Rachael's calls, the political surveys and Newt Gingrich's calls to my cell phone I'd be a pretty happy camper. Newt doesn't want to hear what I have to say anyway.
The Almighty Buck

UBS Rogue Trader Loses $2 Billion In Unauthorized Trades 360

PolygamousRanchKid writes with this snippet from Reuters that sounds like a ready-made movie script: "Switzerland's UBS said on Thursday it had discovered unauthorized trading by a trader in its investment bank had caused a loss of some $2 billion. 'The matter is still being investigated, but UBS's current estimate of the loss on the trades is in the range of $2 billion,' the bank said in a brief statement just before the stock market opened." Asks the RanchKid: "I wonder how this will reopen the debate about the role of computer systems in the trading and the safeguards that are supposed to protect against these risks. But if microseconds mean millions in trading ... who has time for checks?"

Comment Untraceable = Unaccountable (Score 3, Informative) 68

This is worthless pandering. The fact is that there is no way for the receiver of a spoofed CID call to complain. The number on the Caller ID doesn't identify the caller, and the caller won't identify themselves. If you can't identify the caller, you can't complain. If you can't complain, the callers can't be held accountable. The system is broken, and therefore so are all the laws that assume the system is working. Fix the system first, then write new laws if they're needed.
Crime

FCC Ups Penalties For Caller ID Spoofing 68

GovTechGuy writes "The FCC adopted new rules on Thursday that would significantly increase the penalties for individuals or organizations that alter their caller ID information to commit fraud or with other harmful intent. The new rules allow the FCC to fine violators $10,000 per violation plus more for every day it continues. Users can still change their caller ID info as long as it's not for fraud or harmful purposes."
Iphone

Fake GSM Base Station Trick Targets IPhones 64

mvar writes "While his Black Hat DC Conference demonstration was not flawless, a University of Luxembourg student on Wednesday did show that it's possible to trick iPhone users into joining a fake GSM network. Ralf-Philipp Weinmann showed how to cobble together a laptop using open-source software OpenBTS and other low-cost gear to create a fake GSM transmitter base station to locate iPhones in order to send their owners a message. A number of iPhone users in the room expressed surprise that they had gotten a message asking them to join the network. 'You want to get phones not just used by the teenage crowd but executives,' said Weinmann, adding that it is possible to 'have complete control of the phone.' Part of the reason these fake GSM network attacks are possible is because the code base used in smartphones such as the iPhone, which is Infineon-based, goes back to the 1990s."
The Internet

Submission + - Will feds mandate Internet routing security? (networkworld.com)

alphadogg writes: The Department of Homeland Security has spent $3 million over the past few years on research aimed at bolstering the security of the Internet's routing system.

Now, as this research is being deployed across the Internet, DHS wants government agencies and their carriers to be among the earliest adopters of the new Resource Public Key Infrastructure (RPKI) system that it helped create.

DHS considers the RPKI system to be a much-needed first step in securing the Internet's core routing protocol, which is called the Border Gateway Protocol (BGP). In addition to its support of RPKI, DHS also has spent around $1 million on research and software development aimed at adding security directly to BGP.

RPKI helps improve routing security by adding a layer of encryption to the communications between Internet registries and network operators. With RPKI, network operators can verify that they have the authority to route traffic for a block of IP addresses or routing prefixes known as Autonomous System Numbers.

RPKI is designed to prevent Internet routing attacks http://www.networkworld.com/news/2009/011509-bgp-attacks.html and accidents, such as the recent China Telecom Internet traffic hijacking incident http://www.networkworld.com/news/2010/111810-china-telecom-operator-denies-hijacking.htmlthat has received attention on Capitol Hill.

Wireless Networking

Submission + - Verizon LTE To Focus First On Business Users (computerworld.com)

CWmike writes: Verizon Wireless said Wednesday that it will launch its faster Long Term Evolution (LTE) wireless network in 38 cities, reaching 110 million people, on Sunday, with the initial focus on business users who deploy LTE over new $100 USB modems connected to laptops. What's less clear is when actual smartphones will be sold by Verizon that are ready for advertised LTE download speeds of 5Mbit/sec. to 12 Mbit/sec. That speed is about 10 times faster than what Verizon currently offers. Verizon CEO Ivan Seidenberg recently said LTE smartphones will be launched by February, while Verizon CTO Tony Melone today said they would be ready by mid-2011, although he added that his timeline should not be taken as 'any different' from Seidenberg's. More information on devices and release dates will be announced at next month's Consumer Electronics Show, Melone said.

Comment I'll take my site down rather than comply (Score 1) 420

I will take my neighborhood civic association website down before I spend my personal, volunteer time to make it ADA compliant. It's not that I don't want it to comply, but there's simply no budget to hire people who know how to do this right, and I can't put the extra time in to do this myself.
Crime

Submission + - Man loses $20 million after having laptop repaired (networkworld.com)

sluggyproxy writes: A wealthy man took his laptop in to a local computer store to have a virus removed. According to police, the store owner was able to convince the man that the virus was in fact a symptom of a much larger plot in which he was being menaced by government intelligence agencies, foreign nationals . . .
Facebook

Submission + - Facebook buys (most of) drop.io (idg.com.au)

angry tapir writes: "Facebook has purchased most of drop.io, an online content-sharing service, but the social-networking giant sounds more interested in acquiring the company's developers than its technology. Drop.io is a service that lets users create a "drop" where they can share documents, videos and other digital content. The user can set a time for how long the drop will exist, decide who can view the content, set permissions for who can alter the content and share content in a variety of ways, including on Facebook."
Transportation

TSA To Make Pat-Downs More Embarrassing To Encourage Scanner Use 642

Jeffrey Goldberg writes for the Atlantic about his recent experiences with opting out of the back-scatter full-body scanners now being used to screen airport travelers. Passengers can choose to submit to a pat-down instead of going through the scanners, but according to one of the TSA employees Goldberg talked to, the rules for those are soon changing to make things more uncomfortable for opt-outs, while not doing much for actual security. He writes, 'The pat-down, while more effective than previous pat-downs, will not stop dedicated and clever terrorists from smuggling on board small weapons or explosives. When I served as a military policeman in an Israeli army prison, many of the prisoners 'bangled' contraband up their a**es. I know this not because I checked, but because eventually they told me this when I asked. ... the effectiveness of pat-downs does not matter very much, because the obvious goal of the TSA is to make the pat-down embarrassing enough for the average passenger that the vast majority of people will choose high-tech humiliation over the low-tech ball check."

Slashdot Top Deals

Never test for an error condition you don't know how to handle. -- Steinbach

Working...