Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Your Rights Online

Submission + - 9th Circuit Appeals Court: 4th Amendment Applies At The Border (techdirt.com) 1

An anonymous reader writes: Techdirt reports:

"Here's a surprise ruling. For many years we've written about how troubling it is that Homeland Security agents are able to search the contents of electronic devices, such as computers and phones at the border, without any reason. The 4th Amendment only allows reasonable searches, usually with a warrant. But the general argument has long been that, when you're at the border, you're not in the country and the 4th Amendment doesn't apply. This rule has been stretched at times, including the ability to take your computer and devices into the country and search it there, while still considering it a "border search," for which the lower standards apply. Just about a month ago, we noted that Homeland Security saw no reason to change this policy.

Well, now they might have to. "

Comment Re:Accept for session (Score 1) 369

I like the cookie jar idea. I tried blocking third party cookies and it makes too many sites less then functional. Not all third party cookies are advertising. Newspaper sites that uses Disqus to host comments is one example. Gmail uses other google sites for cookies. There needs to be a way to whitelist some sites so they can set cookies regardless.

Comment Dysfunctional (Score 1) 384

Posting with my Galaxy Tab using Chrome. Links to stories have no context menu for press and hold so it is not easy to open in new tab. Once in a story the back button does not return me to the list, pressing the back button twice sends me back to the login screen. Login failed without a message.
Security

Submission + - Trojan Takes Extended 'Naps' To Avoid Detection (securityledger.com)

chicksdaddy writes: "Even the bleakest circumstances look a bit brighter after a good nap — a fact that isn’t lost on malware authors, according to researchers at the firm FireEye, which have identified a new Trojan Horse program that uses extended sleep cycles to fool behavior based malware detection technology.

In a blog post Tuesday, researchers Abhishek Singh and Ali Islam said the new malware, dubbed Trojan Nap, has a function, dubbed SleepEx() that can be used to configure long “naps” that the malware takes after it is installed on a compromised system. The default value, 600,000 milliseconds – or 10 minutes – seems designed to fool automated analysis systems that are programmed to capture a sample of behavior for a set time frame. “By executing a sleep call with a long timeout, Nap can prevent an automated analysis system from capturing its malicious behavior,” FireEye said."

Slashdot Top Deals

I have hardly ever known a mathematician who was capable of reasoning. -- Plato

Working...