Please create an account to participate in the Slashdot moderation system


Forgot your password?

Submission + - Private company leads to arrests of three hackers ten years after attack 2

Jdogatl writes: I was intruiged by a bit of news that reports that 10 years after a digital attack, a forensic investigation company, Digital Investigation, lead to the arrest of three hackers (actually two hackers hired by a third party). They were asked in 2013 to investigate an attack on a lawfirm 9 years after the initial attack. The investigating company says that someone hacked and leaked a DDoS commercial service's userdatabase and was able to eventually track down the hackers because one of them logged did not login through a VPN once. Oops.

The company lays out the details of their investigation and though it is in Dutch it was interesting that the conclusion was largely due to "someone" leaking the information about the hacker. It raises a couple of questions, if you were a security company and obviously not going to get anywhere would you hack a company's user database (regardless of the legality of the service provided) and say that it was leaked by "some" hacker to avoid being charged yourself? Also, is it not a bit odd that the information that brought down the hackers was still retained 9 years after the attacks? Or that being stupid once, 10 years ago, can still bring you down. Should there not be a push for statute of limitations on cyber crime?

Sorry, the link is in Dutch.

Submission + - Endeavor stack being rebuilt piece by piece (

dangle writes: The Exposition Park museum in LA is working to rebuild the Endeavor launch stack, a display that will take thousands of pieces to complete due to parts that are scattered at NASA facilities, museums and other places across the U.S. Most are one of a kind and impossible to replicate. Dennis Jenkins, who spent his entire 30-plus year career sending the shuttles into space, is playing a key role in locating essential parts using his own and his colleagues' institutional memory. Employed by NASA contractor Martin Marietta, he helped write the software used in loading and controlling the liquid oxygen needed to launch the 2,250-ton shuttle assembly into low Earth orbit. Now, with the program part of a bygone era of exploration, the 57-year-old works for the California Science Center, helping officials figure out how to rebuild Endeavour.

Submission + - Windows XP can put SOX, HIPAA, credit card security-compliance at risk (

coondoggie writes: When Microsoft stops supporting Windows XP next month businesses that have to comply with payment card industry (PCI) data security standards as well as health care and financial standards may find themselves out of compliance unless they call in some creative fixes, experts say. Strictly interpreted, the PCI Security Standards Council requires that all software have the latest vendor-supplied security patches installed, so when Microsoft stops issuing security patches April 8, businesses processing credit cards on machines using XP should fall out of PCI compliance,

Comment Re:Overstating their case (Score 1) 168

Exactly. For a while I was "going for it" to see how far I could rise in academics. I used to joke that I had risen from street thug to one of the guys that gets to sit at the bar in the local don's place. But I always added the caveat "at least I don't have to kill anyone or worry about being killed."

Submission + - Syrian Electronic Army Hacks Domain Data for Twitter, NY Times

Trailrunner7 writes: The Syrian Electronic Army, a group known for attacking high-profile media sites in the last year or so, has in the last few hours compromised the domain information for a large number of sites, including the New York Times home page and some of Twitter’s domains. Security researchers say that the most likely attack vector was the domain registrar used by the companies.

Both the Times and Twitter, as well as a long list of other companies including Google and Yahoo, use a company called Melbourne IT as a domain registrar. Researchers following the attack say that the WHOIS and domain information for the Times and Twitter domains was changing back and forth between legitimate data and the hacked SEA data for much of the last few hours. The Times home page was offline sporadically Tuesday afternoon and the paper reported that the company’s CIO told employees to be cautious sending email “until this situation is resolved”.

Submission + - NSA to cut 90% of Sysadmins (

dangle writes: In an attempt to prevent future data leaks, Army Gen. Keith B. Alexander, the NSA’s director, has announced plans to cut almost all the agency's system administrators. “What we’re in the process of doing – not fast enough – is reducing our system administrators by about 90 percent,” he said last week at Fordham University in New York. Many of those systems administrators are contractors, like Snowden was. Instead of the 1,000 systems administrators NSA uses, Alexander wants to move more of the operation to the cyber cloud, called the Intelligence Community’s Information Technology Enterprise (ICITE), which relies on a network of computers linked on the Internet. “We’ve put people in the loop of transferring data, securing networks and doing things that machines are probably better at doing,” Alexander said.

Submission + - Astronomers Identify Asteroids That Can Easily Be Captured

Hugh Pickens DOT Com writes: Long overlooked as mere rocky chunks leftover from the formation of the solar system, asteroids have recently gotten a lot more scrutiny as NASA moves forward with plans to capture, tow, and place a small asteroid somewhere near our planet and two different private space companies, Planetary Resources and Deep Space Industries, plan to seek out and mine precious metals and water from near-Earth asteroids. Now Adam Mann reports that astronomers have identified 12 candidate Easily Retrievable Objects (EROs) ranging in size from approximately 2 meters to 60 meters in diameter that already come (cosmically) close enough to our planet, that it would take a relatively small push to put into orbits around Lagrange points near Earth using existing rocket technology. For example, 2006 RH120, could be sent into orbit around L2 by changing its velocity by just 58 meters per second with a single burn on 1 February 2021. Moving one of these EROs would be a “logical stepping stone towards more ambitious scenarios of asteroid exploration and exploitation, and possibly the easiest feasible attempt for humans to modify the Solar System environment outside of Earth (PDF),” write the authors in Celestial Mechanics and Dynamical Astronomy. None of the 12 ERO asteroids are new to astronomers; in fact one of them became briefly famous when it was found to be temporarily orbiting the Earth until 2007. But until now nobody had realized just how easily these bodies could be captured.

Submission + - NASA tests software algorithm that could precisely land future spacecraft (

coondoggie writes: magine if you had developed, built and flown a spacecraft that successfully traversed the cosmos but upon landing, spun out of control or hit something that destroyed the ship. Such nightmare scenarios are exactly what NASA engineers are developing sophisticated software technology to avoid. NASA is currently testing one of the more important components of such software — the algorithms that incorporate the spacecraft's trajectory, speed and landing information to guide a ship to a safe arrival. The latest algorithm, known as Fuel Optimal Large Divert Guidance algorithm (G-FOLD) is being flight-tested in conjunction with Masten Space Systems at the Mojave Air and Space Port in California.

Submission + - Intel challenges ARM on power consumption... and wins. (

GhostX9 writes: Tom's Hardware just published a detailed look at the Intel Atom Z2760 in the Acer Iconia W510 and compared it to the NVIDIA Tegra 3 in the Microsoft Surface. They break it down and demonstrate how the full Windows 8 tablet outperforms the Windows RT machine in power consumption. They break down power consumption to include the role of the CPU, GPU, memory controller and display. Anandtech is also reporting similar findings, but only reports CPU and GPU utilization.

Be careful when a loop exits to the same place from side and bottom.