Forgot your password?
typodupeerror

+ - Nokia announces MeeGo 1.2 for Developers w/ N900->

Submitted by operator_error
operator_error (1363139) writes "Jukka Eklund at Nokia writes to the Meego Dev list: "I am thrilled to announce a little thing we started at Nokia. Basically we want to have MeeGo running in N900 device, so that it's really usable as your daily development device. Basic Handset UX should work, phone calls, SMS, web browsing. So we are concentrating on a few selected features and polish those to be "perfect". It might mean that we leave out some things in MeeGo 1.2 trunk for this edition, but that is not the default intention.

We are doing this fully on the open, and I hope this is an interesting project where we all in the community work towards the same goal: have a great MeeGo edition in the N900. This work is naturally based on the great work done already by N900 adaptation team lead by Harri and Carsten.

The wiki is up here: http://wiki.meego.com/ARM/N900/DeveloperEdition. It will populated with more information as we go, thanks for the patience.

Br,
Jukka
Developer Edition product manager" ...Also folks, be sure to stay tuned for the new Nokia N950 meant only as a (likely) unsubsidized Developer's hardware refresh of the N900. Only rumor has it that it will not arrive with a slide-out keyboard. How important is having a N900-style keyboard to you, along with the new Meego Love Nokia software continues to offer?"

Link to Original Source
Security

Critical Flaw Found In Virtually All AV Software 279

Posted by Soulskill
from the if-only-there-were-something-more-monolithic-to-blame dept.
Securityemo writes "The Register is running an article about a new method to bypass antivirus software, discovered by Matousec. By sending benign code to the antivirus driver hooks, and switching it out for malicious code at the last moment, the antivirus can be completely bypassed. This attack is apparently much more reliable on multi-core systems. Here's the original research paper." El Reg notes that "The technique works even when Windows is running under an account with limited privileges," but "it requires a large amount of code to be loaded onto the targeted machine, making it impractical for shellcode-based attacks or attacks that rely on speed and stealth. It can also be carried out only when an attacker already has the ability to run a binary on the targeted PC."
First Person Shooters (Games)

Left 4 Dead 2 Approved In Australia After Edits 134

Posted by Soulskill
from the going-out-on-a-limb dept.
Last month we discussed news that Valve's upcoming shooter Left 4 Dead 2 had been denied classification in Australia, which meant the game could not be legally sold there. Now, after a series of edits which removed "considerable amounts of gore from gameplay," Australia's classification board has given the game an MA15+ rating. Their new report (PDF) says, "No wound detail is shown and the implicitly dead bodies and blood splatter disappear as they touch the ground. ... The board notes that the game no longer contains depictions of decapitation, dismemberment, wound detail or piles of dead bodies lying about the environment." The unmodified version of the game may still be approved, pending a review that concludes on October 22nd.
Security

+ - Storm botnet spams Youtube exploit->

Submitted by cottagetrees
cottagetrees (1093331) writes "Security researcher Roger Thompson at Exploit Prevention Labs posted about a big Storm botnet spam that tells the recipient their face is all over 'net on a YouTube video. The hyperlink to the video looks innocent enough, though the html under the link takes the user to an exploitive IP address that attempts a driveby download of the Q4Rollup exploit, a package of about a dozen encrypted exploits. If the user is unpatched against anything, they're hit. Here's the text of the spam I personally received this morning: "Subject: Who is that your with? lol Date: Sat, 25 Aug 2007 09:40:32 -0400 From: To: OMG, what are you doing man. This video of you is all over the net. here is the link I got http://www.youtube.com/watch?v=pAqQ2G671GV (in the html email, the actual hyperlink is to a different address, which I confirmed was exploitive by pasting it into LinkScanner Online at http://linkscanner.explabs.com/linkscanner/default .asp I test all my suspicious hyperlinks here.)"
Link to Original Source

TRANSACTION CANCELLED - FARECARD RETURNED

Working...