Forgot your password?
typodupeerror

Comment: Re:It's a network issue, not a PLC problem. (Score 2) 17

by IDreamInCode (#39612963) Attached to: Project Basecamp Adds Stuxnet-Like Attacks To Metasploit
This is partially true. While the network should be separate, it only takes one computer with a USB cell modem connection to infect the PLC. Hell, it doesn't even need to be a live connection. A contractor with an infected laptop can infect the whole network when he plus in to diagnose the PLC. Bam, the PLC is modified for a future fail.

+ - Birdman boots alternate recovery on DroidX!->

Submitted by rainabba
rainabba (1876222) writes "Aside from rooting the DroidX (which was also done by Birdman), getting a custom recovery running is the next most important step in being able to flash custom roms. As of 6am GMT-7, Birdman and accomplished exactly that. It will take another day or 2 to polish the recovery and process to a point where it's viable for the average Android "hacker", but this should lead to Froyo on the DroidX, and who knows what else. It also PROVES that eFuse means little to us and Motorola has failed to prevent the "tampering" of their devices just as every other manufacturer has.

More info at: http://tiny.cc/BirdmanAltRecoveryOnDX

For updates, follow http://twitter.com/alldroid

-RAINABBA
http://alldroid.org/"

Link to Original Source
Security

Web Scam Bilks State of Utah Out of $2.5M 138

Posted by kdawson
from the lessons-from-the-nigerian dept.
KitB sends in a story in the Salt Lake Tribune that tells of a Web-based scam, resembling some used by Nigerian gangs, that snared the state of Utah. $2.5M was sent to a bank account in Texas before the bank raised a question and then froze $1.8M in the account. "Thieves apparently used a Nigerian-based scam to steal $2.5 million from the Utah treasury, covering their tracks by using intermediaries and a church address. A Salt Lake Tribune review of the names listed in a search warrant as receiving or transferring money [found] names of African origin or connections to that continent. Michael Kessler, ... a forensic accounting [investigator] in New York City, said the thieves appear to have used a simple scam that originated in Nigeria about five years ago. The Utah theft is the first time he's seen a government victimized. 'Their IT people should have known better,' Kessler said after reviewing a copy of the search warrant Thursday. 'It sounds like any kid could have done this.'"
Books

A Look Back At Kurzweil's Predictions For 2009 307

Posted by kdawson
from the no-one-expects-the-mule dept.
marciot writes "It's interesting to look back at Ray Kurzweil's predictions for 2009 from a decade ago. He was dead on in predicting the ubiquity of portable computers, wireless, the emergence of digital objects, and the rise of privacy concerns. He was a little optimistic in certain areas, predicting the demise of rotating storage and the ubiquity of digital paper a bit earlier than it appears it will actually happen. On the topic of human-computer speech interfaces, though, he seems to be way off." And of course Kurzweil missed 9/11 and the fallout from that. His predictions might have been nearer the mark absent the war on terror.
Privacy

Tool To Allow ISPs To Scan Every File You Transmit 370

Posted by timothy
from the in-case-they-run-out-of-human-tools dept.
timdogg writes "Brilliant Digital Entertainment, an Australian software company, has grabbed the attention of the NY attorney general's office with a tool they have designed that can scan every file that passes between an ISP and its customers. The tool can 'check every file passing through an Internet provider's network — every image, every movie, every document attached to an e-mail or found in a Web search — to see if it matches a list of illegal images.' As with the removal of the alt.binary newgroups, this is being promoted under the guise of preventing child porn. The privacy implications of this tool are staggering."
Security

Patch DNS Servers Faster 145

Posted by kdawson
from the hard-times-coming dept.
51mon writes "Austrian CERT used data from one of their authoritative DNS server to measure the rate at which the latest DNS patch (source port randomization) is being rolled out to larger recursive name servers. While about half the traffic (PDF) they receive is now using source port randomization, their data suggest that this is due to ISPs who roll out such fixes immediately. The rate of patching has fallen to disappointingly low levels since. If your ISP isn't patched, perhaps it is time to switch." After details of the DNS vulnerability leaked, researchers |)ruid and HD Moore released attack code; ZDNet's security blog has an analysis.

You can bring any calculator you like to the midterm, as long as it doesn't dim the lights when you turn it on. -- Hepler, Systems Design 182

Working...