Forgot your password?
typodupeerror

+ - Yahoo! Mail Compromised - Users Urged to Change Passwords Immediately-> 1

Submitted by MAXOMENOS
MAXOMENOS (9802) writes "Today Yahoo! announced via their Tumblr page that Yahoo! Mail was hacked, and advised their users to change their passwords immediately. Quoting:

Based on our current findings, the list of usernames and passwords that were used to execute the attack was likely collected from a third-party database compromise. We have no evidence that they were obtained directly from Yahoo’s systems. Our ongoing investigation shows that malicious computer software used the list of usernames and passwords to access Yahoo Mail accounts. The information sought in the attack seems to be names and email addresses from the affected accounts’ most recent sent emails.

"

Link to Original Source
The Internet

The Greatest Keyboard Shortcut Ever 506

Posted by timothy
from the wish-I'd-known-this-15-years-ago dept.
Hugh Pickens DOT Com writes "Ryan Vogt writes in the Mercury News that Shakespeare described death as 'the undiscovere'd country, from whose bourn no traveller returns.' Did you know there is a the miraculous way to resuscitate tabs sent to the 'undiscovere'd country,' a sort of Ctrl-Z for the entire Internet, that means 'no more called-out cusswords, no more wishing the back button had you covered when, aiming to click on a tab, you accidentally hit the little X on the tab's starboard.' For Macs: Command [plus] shift [plus] t reopens the last tab. For PCs: Ctrl [plus] Shift [plus] T. 'Try it right now. Close this tab and bring it back. I dare ya.' Melia Robinson's trick [described for Chrome] works in Firefox and Internet Explorer, too, so clumsy mousing won't send the the E*Trade tab you mistakenly closed all cued up to sell those 10,000 shares of stock or your long political post on your uncle's Facebook page on a one-way trip to the undiscovere'd country in those browsers, either." No guarantees on the stock trading.
Security

+ - ATM Skimming Ring Compromised 6,000 Bank Accounts->

Submitted by
Orome1
Orome1 writes "U.S. federal authorities have announced the filing of an indictment against two alleged leaders of an international scheme to steal customer bank account information using “skimming” technology that secretly recorded the data of customers who used ATMs at banks in New York, New Jersey, Illinois, and Wisconsin. The ring targeted J.P. Morgan Chase (“Chase”), and Capital One, N.A. banks. Throughout the course of the scheme, they engaged in over 50 skimming incidents that resulted in the compromise of over approximately 6,000 individual bank accounts, from which the defendants made and attempted to make over approximately $3 million in unauthorized withdrawals."
Link to Original Source
Earth

Meet the Saber-Toothed Squirrel 59

Posted by samzenpus
from the we're-going-to-need-a-bigger-acorn dept.
sciencehabit writes "Researchers have discovered the fossil remains of a 94-million-year-old squirrel-like critter with a long, narrow snout and a pair of curved saber-fangs that it would have likely used to pierce its insect prey. The creature, pieced together from skull fragments unearthed in Argentina and dubbed Cronopio dentiacutus, was not ancestral to us or any living mammal. Instead, it belonged to an extinct group called dryolestoids, a cadre of fuzzy mammals that scurried about in the shadow of long-necked dinosaurs."

Comment: Re:The two I talked to apparently couldn't hang up (Score 1) 212

by Introspective (#37475546) Attached to: Microsoft Dumps Partner For Fake Support Call Scam

Then again, it's possible that the minimum wage staff in their call centre honestly believe that the script they're following is legit.
From the calls I've got myself and the ones reported by others, it really sounds like the callers truly believe what they're saying and don't know much better.

Image

Drupal E-commerce With Ubercart 2.x 65 Screenshot-sm

Posted by samzenpus
from the read-all-about-it dept.
Michael J. Ross writes "In the past, a Web developer tasked with building an online store would most likely do so using a dedicated e-commerce system, instead of a content management system (CMS), because even though the leading CMSs offered more features and flexibility, they did not provide robust e-commerce capabilities, such as product listings, bulk import, pricing in multiple currencies, a built-in shopping cart, and integration with tax and shipping information sources. Since that time, e-commerce systems have become more like CMSs, by adding features such as blogging and forums. At the same time, CMSs are continually expanding their e-commerce potential, usually in the form of developers adding plug-ins. For developers using Drupal, there traditionally have been two major e-commerce plug-ins (known as "modules"): Ubercart and e-Commerce. The former has emerged as the leader, and is explored in Drupal E-commerce with Ubercart 2.x." Read on for the rest of Michael's review.
Image

Lies, Damned Lies and Cat Statistics 175 Screenshot-sm

Posted by samzenpus
from the nine-lies dept.
spopepro writes "While un-captioned cats might be of limited interest to the /. community, I found this column on how a fabricated statistic takes on a life of its own interesting. Starting with the Humane Society of the United States' (HSUS) claim that the unsterilized offspring of a cat will '...result in 420,000 cats in 5 years,' the author looks at other erroneous numbers, where they came from and why they won't go away."
Image

Girl Quits On Dry Erase Board a Hoax 147 Screenshot-sm

Posted by samzenpus
from the take-this-job-and-shove-it dept.
suraj.sun writes "It's the same old story: young woman quits, uses dry erase board and series of pictures to let entire office know the boss is a sexist pig, exposes his love of playing FarmVille during work hours." Story seem too good to be true? It probably is, at least according to writer Peter Kafka. Even so, Jay Leno and Good Morning America have already reached out to "Jenny."
NASA

The Sun Unleashes Coronal Mass Ejection At Earth 220

Posted by Soulskill
from the return-fire dept.
astroengine writes "Yesterday morning, at 08:55 UT, NASA's Solar Dynamics Observatory detected a C3-class flare erupt inside a sunspot cluster. 100,000 kilometers away, deep within the solar atmosphere (the corona), an extended magnetic field filled with cool plasma forming a dark ribbon across the face of the sun (a feature known as a 'filament') erupted at the exact same time. It seems very likely that both eruptions were connected after a powerful shock wave produced by the flare destabilized the filament, causing the eruption. A second solar observatory, the Solar and Heliospheric Observatory, then spotted a huge coronal mass ejection blast into space, straight in the direction of Earth. Solar physicists have calculated that this magnetic bubble filled with energetic particles should hit Earth on August 3, so look out for some intense aurorae — a solar storm is coming."
Space

+ - Japanese H-IIA launches with Ikaros and Akatsuki->

Submitted by JoshuaInNippon
JoshuaInNippon (1635315) writes "At 6:58 in the morning of May 21, 2010 (JST), a JAXA H-IIA rocket was successfully launched from southern Japan. After about 27 minutes of flight, the rocket reached space and sent off its cargo, including a Venus probe named Akatsuki, an experimental solar sail spacecraft named Ikaros, and several small satellites. The success of both Akatsuki and Ikaros could help bring important information on Earth's mysterious sister planet and on near future, cost effective space travel."
Link to Original Source
Security

+ - School Spy Program Used on Students Hackable->

Submitted by Anonymous Coward
An anonymous reader writes "A controversial remote administration program that a Pennsylvania school district installed on student-issued laptops contains a security hole that put the students at risk of being spied on by people outside the school, according to a security firm that examined the software.

The LANrev program contains a vulnerability that would allow someone using the same network as one of the students to install malware on the laptop that could remotely control the computer. An intruder would be able to steal data from the computer or control the laptop webcam to snap surreptitious pictures.

The vulnerability in the LANrev system lies in the symmetric-key encryption it uses for authentication between the client and the server, and isn’t related to the optional Theft Track feature. Therefore, even computers that are not using the theft feature are vulnerable.

The authentication key is stored in the client-side software and is fairly easy to decipher, says Frank Heidt, president and CEO of Leviathan. It took Leviathan just a few hours to determine that it’s a stanza from a German poem. The key is the same for every computer using LANrev.

The LANrev client software on a computer is configured to contact a server every minute or so to check in and see if the server has any commands for it. Knowing what the key is would let an attacker who has installed a sniffer on the network intercept that ping and masquerade as the server in communication back to the laptop. It requires the attacker to be on the same network as the target machine — for example, on a wireless network at the school or anywhere else that offers free Wi-Fi the student might use."

Link to Original Source
Australia

+ - Scientists claim systems cooling breakthrough->

Submitted by schliz
schliz (994115) writes "Australian researchers have developed an electronics cooling system that uses a 'synthetic jet' to increase the heat transfer in the channel by up to four and a half times. They claim the technique is more efficient at removing heat and does not require additional fluid circuits to create the jet, enabling the development of faster computer processors and more powerful electronic devices."
Link to Original Source
Google

+ - Google shows major improvements with Android 2.2-> 1

Submitted by Anonymous Coward
An anonymous reader writes "Google has used the I/O developers conference to launch the latest version of its mobile operating system, Android 2.2, codenamed Froyo. Google claims the operating system will be from two to five times faster thanks to advances made in the compilers and the Dalvik virtual machine it uses, and how it is ported to new processors and platforms. On the enterprise front the new operating system comes with full support for Microsoft Exchange, including access to the global address book and the ability to translate native security features to mobile handsets. APIs have also been added to allow controls such as the automatic wiping of missing handsets and other remote management features. Google is also making its voice translation and search APIs open to developers, and showed off an application developed for the handset that allowed real time translation from English to French."
Link to Original Source

Refreshed by a brief blackout, I got to my feet and went next door. -- Martin Amis, _Money_

Working...