Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:Such a thing as "too hot" (Score 2) 348

by nitsew (#41412645) Attached to: Favorite way to add capsaicin to a dish:

I agree completely. I tend to stay away from 'extract' sauces, as they usually have a very bad flavor, and are primarily heat. I have been hooked on Lucky Dog Hot Sauce lately. [no affiliation] -- It has roasted peppers and a great roasted garlic flavor to it. It has just enough heat to add a kick, but not so much as to overpower the taste of the original dish that you add it to.


+ - Malware, Exploit Kit Writers Merging Their Skills->

Submitted by Trailrunner7
Trailrunner7 (1100399) writes "Botnets have been around for more than 15 years now, and for much of that time they've been the favored platform for attackers looking to compromise users on a large scale and monetize those infected machines. But now, as researchers and authorities begin to have more success with botnet takedowns and arrests, the attackers behind malware kits and exploit kits are beginning to work together and learn from one another.

"Today, exploit kits and malware kits are sold separately, but we believe you'll see one combined kit to build and control malware soon," said Aviv Raff of Seculert, who has been researching the trend.

Those two functions in recent years have been performed by distinct groups, one of which develops and sells malware kits and another that does the same for exploit kits. But as the attack landscape continues to evolve and broaden, those functions are becoming more closely related and intertwined."

Link to Original Source

+ - War Between LulzSec and The Jester Intensifies->

Submitted by Dangerous_Minds
Dangerous_Minds (1869682) writes "There's an increasingly testy war between LulzSec and The Jester as of late. The Jester recently posted chatlogs and compromising data on LulzSec security leader Sabu. In response, LulzSec ridiculed The Jester by belittling his efforts to take down terrorist websites and even going as far as rewriting one of The Jester's PHP scripts from 60 lines to 3. One can only expect more fireworks between the two after this."
Link to Original Source

Comment: Re:Kevin Mitnick ripoff? (Score 5, Informative) 114

by nitsew (#35435594) Attached to: Book Review: Social Engineering: The Art of Human Hacking

Didn't Mitnick do this 8 years ago with Art of Deception. Even the title is sort of stolen. Is there anything new in here that hasn't already been written about by one of the world's greatest social engineers?

If you look closely at the front of the book, you will see a recommendation by Mitnick. Also, if you read the review, it explains how this is different from Mitnick's book.

"Two of the most popular books to date on social engineering to date have been Kevin Mitnick’s The Art of Deception: Controlling the Human Element of Security and The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers. The difference between those books and Hadnagy, is that Mitnick for the most part details the events and stories around the attacks; while Hadnagy details the myriad specifics on how to carry out the social engineering attack. "

But, thanks for playing!

I never cheated an honest man, only rascals. They wanted something for nothing. I gave them nothing for something. -- Joseph "Yellow Kid" Weil