Forgot your password?

Comment: Technical Perspective (Score 1, Interesting) 266

Ok say they get into every ISP's network...
how are they going to monitor every device? pings? imagine the traffic overhead for that?
will the NSA have to pay to be in the "fast-lane"?
what about Dynamic IP's ? how often will they monitor those changes?

Comment: Snail Mail (Score 1) 210

by muphin (#47901191) Attached to: Turning the Tables On "Phone Tech Support" Scammers
Has anyone actually social-engineered them to provide postal details.
me: you want me to install __?
them: yes plz sir, please download and install!
me: how about i just send you the money to come and fix it, i take it you're in india.... where should i send the $500 cheque?
them: please wait wile i talk with my supervisor
them: sorry we cannot do that, do you have a credit card....
me: sorry i only have a cheque, i'm a 70 year old retired investment banker... i have no need for a credit card, i can draw up a bank cheque if you like, isnt $500 enough... ok how much do you need, i never deal with my computer so i dont know how much these things cost... $1,500?
them: ok let me talk to my manager again please
them: ok, as your computer is majourly infected, it will be very expensive to repair, please send $5,000 to.........
me: ok, i'll send it tomorrow, thank you.
them: we will call you once we receive the money, hangs up.
me: calls interpol with the details.

+ - Scientists take picture of quantum cat->

Submitted by sciencehabit
sciencehabit (1205606) writes "These images of a cardboard cutout of a cat were made with light that never touched the object. The technique works a bit like holography, in which a light beam that shines through an object overlaps and interferes with an identical one that passes by it, and that interference is used to encode a 3D image. Besides being really cool, the technique makes it possible to make an image of an object using a color of light that would normally pass through the thing."
Link to Original Source

+ - Hackers are having a "Field Day" with Software Vulnerabilities->

Submitted by amvlad
amvlad (2848247) writes "As you may already know, taking advantage of software vulnerabilities is one of the most commonly used attack vectors on computer systems and accounts for about 40-60% of attacks depending on data sources.

Unfortunately, software vulnerability patching is far too slow and leaves you at risk:"

Link to Original Source

+ - Bioengineered Opiates Don't Require Poppy Plants

Submitted by Jason Koebler
Jason Koebler (3528235) writes "Opiate drugs are on their way to being fully synthesized. Drug makers will no longer have to rely on a plant, the same basic organism that's delivered narcotics to humans since the Neolithic, for the most basic raw materials of opiate painkillers.
Fields of flowering poppies are out, and bioengineered microorganisms are in, at least according to a new paper published in Nature Chemical Biology, which describes a new method of producing opiates with help from a genetically tweaked version of regular baker's yeast."

+ - Top secret firm awarded contract by Russian government to expose Tor browser use->

Submitted by Steve Patterson
Steve Patterson (2850575) writes "Downloaded 150 million times in the last year, the surveillance-evading Tor browser alarms both Russia’s Federal Security Service and the NSA.

On Friday Russia’s Ministry of the Interior, the MVD awarded a contract for 3.9 million ($110 thousand) to an unnamed Russian contractor with top security clearance to uncloak Russian users of the surveillance evading Tor browser. This is the Russia’s Federal Security Service’s FSB response to the surge of Russian Tor users from 80 thousand to 200 thousand due to the restrictions by the Russian government on free use of the internet such as the new law that requires that all Russian bloggers register."

Link to Original Source

+ - Bitcoins are taxable in Australia->

Submitted by smee2
smee2 (731813) writes "The Australian Tax Office's view is that Bitcoin is neither money nor a foreign currency, and the supply of bitcoin is not a financial supply for goods and services tax (GST) purposes. Bitcoin is, however, an asset for capital gains tax (CGT) purposes.

Transacting with bitcoins is akin to a barter arrangement, with similar tax consequences."

Link to Original Source

+ - Surprise! TSA lied!

Submitted by Anonymous Coward
An anonymous reader writes "Does this make you feel safer? The TSA has now admitted that it had allowed illegal immigrants to fly without valid identification, something it had strongly denied when news sources revealed it last month.

[A newly discovered TSA] letter confirms that illegal aliens are being allowed to board planes using a Notice to Appear form (also known as I-862), as [union border patrol official] Darby revealed in July. Hector Garza, a spokesman for the National Border Patrol Council (NBPC) told Darby that Notice to Appear forms can “easily be reproduced or manipulated on any home computer. The Notice to Appear form has no photo, anyone can make one and manipulate one. They do not have any security features, no watermark, nothing. They are simply printed on standard copy paper based on the information the illegal alien says is the truth.”

So, while the TSA routinely sexually abuses American citizens while demanding they provide photo id, the agency has had policies that would allow an illegal immigrant, with unknown background and who has come from outside the country, to board planes using a simple form that anyone can photocopy.

Does anyone but me see something significantly wrong with this picture? Didn’t Congress originally create the TSA to prevent foreign nationals from boarding planes to hijack them?

The TSA is a joke imposed on us by our elected officials and approved of by too many Americans because it allows them to make believe we are doing something about terrorism. Other elected officials and TSA managers and employees than use the agency as a weapon to obtain power and crush the freedom of Americans. In that context, these actions by the TSA, including lying about their policies, make complete sense."

+ - Heartbleed to blame for Community Health Systems breach->

Submitted by Anonymous Coward
An anonymous reader writes "The Heartbleed vulnerability is the cause of the data breach at Community Health Systems (CHS), which resulted in 4.5 million records (containing patient data) being compromised. According to a blog post from TrustedSec, the attackers targeted a vulnerable Juniper router and obtained credentials, which allowed them access to the network's VPN."
Link to Original Source

Comment: Common Security Practise (Score 1) 387

by muphin (#47268255) Attached to: Code Spaces Hosting Shutting Down After Attacker Deletes All Data
I believe the owner of the EC2 had 1 single account (root account) when he should have setup 2 factor authentication for such an account and then created separate accounts, this would have prevented his issue using the security policies AWS has in place....
AWS is always targeted and being reliant on a single account for security is negligent.
So you people out there that use AWS, PLEASE don't use the default account, secure it with 2 factor and then create individual accounts for the services, using security policies to allow communication between each other. - from an AWS certified engineer :)

+ - Australian bank NAB's Bitcoin ban a symptom of the digital currency threat ->

Submitted by oztechmuse
oztechmuse (2323576) writes "The move of banks like Australia's NAB to close accounts of businesses trading in Bitcoin is being justified on the basis of risk whereas the more likely motivation is guarding against a currency that threatens their own business. The issue of risk is largely a smoke screen — especially when compared with the $2.1 trillion that is involved in crime globally — most of which goes through the banking system. This compares to the less than $10 billion in total capitalisation of cryptocurrencies."
Link to Original Source

The Tao doesn't take sides; it gives birth to both wins and losses. The Guru doesn't take sides; she welcomes both hackers and lusers.