Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


+ - Either everyone is cyber-secure or no one is

Submitted by Presto Vivace
Presto Vivace (882157) writes "Bruce Schneier on The Democratization of Cyberattack

When I was working with the Guardian on the Snowden documents, the one top-secret program the NSA desperately did not want us to expose was QUANTUM. This is the NSA's program for what is called packet injection--basically, a technology that allows the agency to hack into computers.

Turns out, though, that the NSA was not alone in its use of this technology. The Chinese government uses packet injection to attack computers. The cyberweapons manufacturer Hacking Team sells packet injection technology to any government willing to pay for it. Criminals use it. And there are hacker tools that give the capability to individuals as well.

All of these existed before I wrote about QUANTUM. By using its knowledge to attack others rather than to build up the internet's defenses, the NSA has worked to ensure that anyone can use packet injection to hack into computers.


+ - Has the Supreme Court made patent reform legislation unnecessary?->

Submitted by Anonymous Coward
An anonymous reader writes "As Congress gears up again to seriously consider patent litigation abuse—starting with the introduction of H.R. 9 (the "Innovation Act") last month—opponents of reform are arguing that recent Supreme Court cases have addressed concerns. Give the decisions time to work their way through the system, they assert.

A recent hearing on the subject before a US House Judiciary Committee (HJC) Subcommittee shined some light on the matter. And, as HJC Chairman Bob Goodlatte, a long-time leader in Internet and intellectual property issues, put it succinctly in his opening remarks:

"We've heard this before, and though I believe that the Court has taken several positive steps in the right direction, their decisions can't take the place of a clear, updated and modernized statute. In fact, many of the provisions in the Innovation Act do not necessarily lend themselves to being solved by case law, but by actual law—Congressional legislation.""

Link to Original Source

Comment: The corporate solution (Score 2) 74

by netsavior (#49175779) Attached to: Ask Slashdot: Wireless Microphone For Stand-up Meetings?
Pretty much every company ever has already solved this problem with polycom (or similar) conferencing phones(ranging from a few hundred dollars on up)

Also conference phone numbers like Webex at all so lots of people can call in, if you need that sort of thing.

This is not a new or unsolvable problem, this is "standard office gear" since the 1990s.

+ - Snowden Reportedly in Talks to Return to YS to Face Trial 1

Submitted by (3830033) writes "The Globe and Mail reports that Edward Snowden's Russian lawyer Anatoly Kucherena says the fugitive former US spy agency contractor who leaked details of the government’s mass surveillance programs was working with American and German lawyers to return home. “I won’t keep it secret that he wants to return back home. And we are doing everything possible now to solve this issue. There is a group of U.S. lawyers, there is also a group of German lawyers and I’m dealing with it on the Russian side.” Kucherena added that Snowden is ready to return to the States, but on the condition that he is given a guarantee of a legal and impartial trial. The lawyer said Snowden had so far only received a guarantee from the US Attorney General that he will not face the death penalty. Kucherena says that Snowden is able to travel outside Russia since he has a three-year Russian residency permit, but "I suspect that as soon as he leaves Russia, he will be taken to the US embassy.""

Deutsche Telecom Calls For Google and Facebook To Be Regulated Like Telcos 94

Posted by timothy
from the oh-definitely-trust-the-government dept.
An anonymous reader writes Tim Hoettges, the CEO of the world's third-largest telecoms company, has called for Google and Facebook to be regulated in the same way that telcos are, declaring that "There is a convergence between over-the-top web companies and classic telcos" and "We need one level regulatory environment for us all." The Deutsche Telekom chief was speaking at Monday's Mobile World Congress, and further argued for a loosening of the current regulations which telcos operate under, in order to provide the infrastructure development that governments and policy bodies are asking of them. Hoettges' imprecation comes in the light of news about the latest Google Dance — an annual change in ranking criteria which boosts some businesses and ruins others. The case for and against regulating Google-level internet entities comes down to one question: who do you trust to 'not be evil'?

Gritty 'Power Rangers' Short Is Not Fair Use 230

Posted by timothy
from the wait-til-you-see-how-scully-revives-walter-white dept.
Bennett Haselton writes: Vimeo and Youtube are pressured to remove a dark, fan-made "Power Rangers" short film; Vimeo capitulated, while Youtube has so far left it up. I'm generally against the overreach of copyright law, but in this case, how could anyone argue the short film doesn't violate the rights of the franchise creator? And should Vimeo and Youtube clarify their policies on the unauthorized use of copyrighted characters? Read on for the rest.

Comment: A double click should not p0wn a computer (Score 1) 479

by iamacat (#49173133) Attached to: Why We Should Stop Hiding File-Name Extensions

Extensions do nothing for non-developers besides lulling them into false sense of security. An average user is not going to know that .cpl is an executable. And what could be safer than .doc? Well, Word has a turing complete macro language that has been exploited countless times. Extensions will not even help you because you just have to fat finger an icon once to have persistent malware on your computer for years.

Nope, the real answer is system level protection to ensure that an app can not do any more damage than a text file. Application sandboxing works pretty well on mobile. Yes, there is always cat and mouse game with malware, but infected phones/tablets are much less common than desktops or laptops. Most "infections" are free games that run on background and open ads in your browser rather than credit card number keylogging. I think this should be default experience on a consumer device. Freedom of tinkering and development is also very important, but should involve explicit steps and visual reminders to make sure no software or person can gain unrestricted access to your device without your knowledge and understanding.

+ - Calling all Samba Users: 2015 User Survey->

Submitted by Anonymous Coward
An anonymous reader writes "What Samba features do you care about most? Do you have problems or
ideas to tell the Samba Team? Which parts of the documentation are
most important to you?

The Samba Team invites all users to participate in the Samba Survey at

The survey takes only 5-10 minutes to complete and runs until the end
of March. We don't of course ask for any personal information, and the
results will be shared with the community in a presentation at the
SambaXP conference in May ( — come and join us there!)

This survey will help us improve Samba and its documentation by better
understanding your needs and listening to your suggestions. If you are
a Samba user, no matter how you use Samba from just experimenting
through to production deployment, we are really keen to get your
feedback. And please do encourage other Samba users to fill it in as well.

Thanks in advance to all survey participants."

Link to Original Source

+ - $415M Silicon Valley Salary-Fixing Conspiracy Settlement Heads For Approval->

Submitted by jfruh
jfruh (300774) writes "A lawsuit last year argued that the biggest players in Silicon Valley, including Google, Apple, Intel, Adobe, Intuit, Lucasfilm, and Pixar had engaged in a conspiracy to fix and suppress employee salaries; an initial settlement in the suit at over $300 million was deemed by a judge to be too low. Now a $415 million settlement is headed for approval."
Link to Original Source
Wireless Networking

Flaw In GoPro Update Mechanism Reveals Users' Wi-Fi Passwords 34

Posted by timothy
from the oopsie dept.
An anonymous reader writes A vulnerability in the update mechanism for the wireless networks operated by GoPro cameras has allowed a security researcher to easily harvest over a 1,000 login credentials (including his own). The popular rugged, wearable cameras can be controlled via an app, but in order to do so the user has to connect to the camera's Wi-Fi network. Israel-based infosec expert Ilya Chernyakov discovered the flaw when he had to access the network of a friend's camera, but the friend forgot the login credentials.

+ - Mississipppi Attorney General Conspires With MPAA To Revive SOPA->

Submitted by jfruh
jfruh (300774) writes "Mississippi Attorney General Jim Hood filed a subpoena last October seeking information about Google’s search and advertising practices in areas related to banned substances, human trafficking and copyrighted material. But a Federal judge has now quashed that investigation — and information from last fall's Sony leak made seemed to indicate that Hood had agreed to work with the MPAA to launch it in the first place, as part of a move to revive the reviled SOPA legislation through other means."
Link to Original Source

+ - Flaw In GoPro Update Mechanism Reveals Users' Wi-Fi Passwords

Submitted by Anonymous Coward
An anonymous reader writes "A vulnerability in the update mechanism for the wireless networks operated by GoPro cameras has allowed a security researcher to easily harvest over a 1,000 login credentials (including his own). The popular rugged, wearable cameras can be controlled via an app, but in order to do so the user has to connect to the camera's Wi-Fi network. Israel-based infosec expert Ilya Chernyakov discovered the flaw when he had to access the network of a friend's camera, but the friend forgot the login credentials."

Supreme Court Gives Tacit Approval To Warrantless DNA Collection 127

Posted by timothy
from the welcome-to-gattica dept.
An anonymous reader writes On Monday, the U.S. Supreme Court refused to review a case involving the conviction of a man based solely on the analysis of his "inadvertently shed" DNA. The Electronic Frontier Foundation (EFF) argues that this tacit approval of the government's practice of collecting anyone's DNA anywhere without a warrant will lead to a future in which people's DNA are "entered into and checked against DNA databases and used to conduct pervasive surveillance."

The next person to mention spaghetti stacks to me is going to have his head knocked off. -- Bill Conrad