Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:PEBKAC (Score 1) 374

This still requires the user to deliberately install the malware. Since it's not compromising the system, but the user, it doesn't need privileges to do this.

Gee, users deliberately installing things that might be harmful for their computer? I can't ever see that happening....

Databases

Submission + - POLL: Should we repeal the Real ID Act? (sodahead.com)

BeatTheChip writes: "May 11, 2011, marks the 6th year since the passage of the Real ID Act.

Real ID has gained a reputation as a national ID card and as means for the US government to expand domestic data surveillance infrastructure. DHS recently defunded the Real ID Act and many are asking the Obama Administration how they will repeal the Real ID Act. To date, 25 states passed legislations opposed to the costs or regulations. Local governments continue to haggle with regulations, restrictions and demands of identity towards citizens.

Take the poll: Do you think it's time to repeal the Real ID Act?"

Submission + - Samsung Galaxy S II Gets 3 Million Preorders (techspot.com)

An anonymous reader writes: Announced three months ago, Samsung has picked up 3 million preorders worldwide for its Galaxy S II smartphone by the end of last month. Given that the device is expected to launch in 120 countries on over 140 mobile operators, the number of preorders will only continue to grow. Oh, and it's not even available for preorder in the US yet.
Android

Submission + - 400% Increase in Android Malware (net-security.org)

Orome1 writes: Enterprise and consumer mobile devices are exposed to a record number of security threats, including a 400 percent increase in Android malware, as well as highly targeted Wi-Fi attacks, according to a report by Juniper Networks. With smartphones set to eclipse PCs as the preferred method of both personal and professional computing, cyber criminals have turned their attention to mobile devices. At the same time, the gap between attacker capabilities and an organization's defenses is widening. These trends underscore the need for further mobile security awareness, as well as more stringent, better integrated mobile security policies and solutions.

Slashdot Top Deals

I've noticed several design suggestions in your code.

Working...