Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Slashdot Deals: Deal of the Day - Pay What You Want for the Learn to Code Bundle, includes AngularJS, Python, HTML5, Ruby, and more. ×

Submission + - SPAM:

Dicdkerman writes: You know this in order to tell you about anything that puts forth the opinion of Fallout Shelter Hack Cheats so well. For those who are hitting the achievement that requires having several dwellers survive 15 hours in the Wastelands, this is actually pretty easy to achieve with an experienced dweller equipped with a good weapon and plenty of Stimpacks. According to Sam Costley, "When you go to bed, resources are not used here to download the software ===>>>>> [spam URL stripped]...
Link to Original Source

Submission + - Cisco Talos Thwarts Massive Exploit Kit Generating $60M Annually From Ransomware (

Da w00t writes: Today, Cisco struck a blow to a group of hackers, disrupting a significant international revenue stream generated by the notorious Angler Exploit Kit. Angler is one of the largest exploit kit found on the market and has been making news as it has been linked to several high profile malvertising/ransomware campaigns. This is the most advanced and concerning exploit kit on the market – designed to bypass security devices and ultimately attack the largest number of devices possible.

In its research, Cisco determined that an inordinate number of proxy servers used by Angler were located on servers of service provider Limestone Networks with the primary threat actor responsible for up to 50 percent of Angler Exploit Kit activity, targeting up to 90,000 victims a day, and generating more than $30M annually. This implies that if you apply the full scope of Angler activity the revenue generated could exceed $60M annually. Talos gained additional visibility into the global activity of the network through their ongoing collaboration with Level 3 Threat Research Labs. Finally, thanks to our continued collaboration with OpenDNS we were able to gain in depth visibility into the domain activity associated with the adversaries.

Submission + - Bypassing browser pop-up blocking: When does software start becoming malware? (

Da w00t writes: Talos security researchers detected a malicious shockwave flash file that not only bypasses pop-up blockers, but also accurately fingerprints computers with the help of some Javascript. The “Infinity Popup Toolkit” is a prime example of software that falls into this gray area by bypassing browser pop-up blocking.

Submission + - SSH Brute force Attackers Taken Down (

An anonymous reader writes: Cisco Talos and Level 3 communications have worked to take down a group that was conducting large scale SSH Brute Force attacks. At times the group was accounting for more than a third of the SSH traffic on the Internet. The threat has been known and action needed to be taken. Show your support by tweeting #DownWithSSHPsychos

Submission + - Sniff and decrypt BLE with Ubertooth (

mpeg4codec writes: Hot on the heels of Omri Iluz's BLE-sniffer-on-the-cheap, I decided to write up the BLE (Bluetooth Smart) sniffer I built on Ubertooth. My sniffer is highly robust, can capture data from connections, and is 100% open source.

I also discovered a major flaw in BLE's crypto that allows an attacker to crack its encryption key and decrypt data, 100% passively. I wrote a tool called crackle that will automatically decrypt encrypted BLE data captured by Ubertooth.

Comment Classified. You keep using that word. (Score 1) 243

I do not think it means what you think it means. Classified documents originate from a classification authority. There is no classification authority within Apple. Classification authorities are within the state and federal government. While Apple is large (and last I heard had more money than the federal reserve), that doesn't mean they can classify documents :)

Now, there can be trade secrets, that's an entirely different thing. :)

Comment So, that KORUS treaty is still a problem, I think. (Score 4, Interesting) 378

Comment Go with Linode. (Score 1) 375

I've been a customer for what feels like 10 years now. Their support is great, they have knowledgable people and yes, you do get root. You can have console access, just not graphical console access. (Who would want X running on a colocated server anyway?)

Here's their faq: - They've got a great community, go pop on IRC on and join #linode. Ask your questions there if there's something you want to know that isn't in the FAQ.

Here's a referral link - you don't really need to use it, but if you do I'll get some free service as a thank you for referring you.

Comment This explains why I still have a job. (Score 1) 388

I used to do sysadmin work professionally, and I still do it personally (I have a Linode VPS) where I host my personal e-mail, website, jabber server, and personal e-mail of family members. It's just one of those things that as a geek a lot of us end up doing.

One of the unspoken golden rules of trust was this: don't fucking read other people's e-mail. Period.

Now I do information security, where I keep my employer's network safe. This includes both external, and internal threats - such as domain admins going rogue, and abusing their powers (I've seen it happen, and wrote up the incident). It really bothers me that 1 out of 4 "IT Professionals" are unprofessional enough to violate the trust that has been granted them.

I have a theory that it's impossible to prove anything, but I can't prove it.