Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Comment: Re:It's a network issue, not a PLC problem. (Score 2) 17

by IDreamInCode (#39612963) Attached to: Project Basecamp Adds Stuxnet-Like Attacks To Metasploit
This is partially true. While the network should be separate, it only takes one computer with a USB cell modem connection to infect the PLC. Hell, it doesn't even need to be a live connection. A contractor with an infected laptop can infect the whole network when he plus in to diagnose the PLC. Bam, the PLC is modified for a future fail.

+ - Birdman boots alternate recovery on DroidX!->

Submitted by rainabba
rainabba writes: Aside from rooting the DroidX (which was also done by Birdman), getting a custom recovery running is the next most important step in being able to flash custom roms. As of 6am GMT-7, Birdman and accomplished exactly that. It will take another day or 2 to polish the recovery and process to a point where it's viable for the average Android "hacker", but this should lead to Froyo on the DroidX, and who knows what else. It also PROVES that eFuse means little to us and Motorola has failed to prevent the "tampering" of their devices just as every other manufacturer has.

More info at:

For updates, follow


Link to Original Source

Web Scam Bilks State of Utah Out of $2.5M 138

Posted by kdawson
from the lessons-from-the-nigerian dept.
KitB sends in a story in the Salt Lake Tribune that tells of a Web-based scam, resembling some used by Nigerian gangs, that snared the state of Utah. $2.5M was sent to a bank account in Texas before the bank raised a question and then froze $1.8M in the account. "Thieves apparently used a Nigerian-based scam to steal $2.5 million from the Utah treasury, covering their tracks by using intermediaries and a church address. A Salt Lake Tribune review of the names listed in a search warrant as receiving or transferring money [found] names of African origin or connections to that continent. Michael Kessler, ... a forensic accounting [investigator] in New York City, said the thieves appear to have used a simple scam that originated in Nigeria about five years ago. The Utah theft is the first time he's seen a government victimized. 'Their IT people should have known better,' Kessler said after reviewing a copy of the search warrant Thursday. 'It sounds like any kid could have done this.'"

A Look Back At Kurzweil's Predictions For 2009 307

Posted by kdawson
from the no-one-expects-the-mule dept.
marciot writes "It's interesting to look back at Ray Kurzweil's predictions for 2009 from a decade ago. He was dead on in predicting the ubiquity of portable computers, wireless, the emergence of digital objects, and the rise of privacy concerns. He was a little optimistic in certain areas, predicting the demise of rotating storage and the ubiquity of digital paper a bit earlier than it appears it will actually happen. On the topic of human-computer speech interfaces, though, he seems to be way off." And of course Kurzweil missed 9/11 and the fallout from that. His predictions might have been nearer the mark absent the war on terror.

Tool To Allow ISPs To Scan Every File You Transmit 370

Posted by timothy
from the in-case-they-run-out-of-human-tools dept.
timdogg writes "Brilliant Digital Entertainment, an Australian software company, has grabbed the attention of the NY attorney general's office with a tool they have designed that can scan every file that passes between an ISP and its customers. The tool can 'check every file passing through an Internet provider's network — every image, every movie, every document attached to an e-mail or found in a Web search — to see if it matches a list of illegal images.' As with the removal of the alt.binary newgroups, this is being promoted under the guise of preventing child porn. The privacy implications of this tool are staggering."

The perversity of nature is nowhere better demonstrated by the fact that, when exposed to the same atmosphere, bread becomes hard while crackers become soft.