Follow Slashdot stories on Twitter


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: There is an element of timing here. (Score 1) 538

At the time many ranking officials in the US had their own email servers - In 2013 the ruling came down to it must be an official government email address and server that was for email and official correspondences . Clinton resigned from that position in 2013 - So what was done was actually the norm for the time.

This so like the opposition to to bring up a non fact in light of the possible presidential bid in 2016
next this we'll hear is "Benghazi, Benghazi, Benghazi" again and the waste of time with yet another Hearing that will cost the american people millions.


Target Confirms Point-of-Sale Malware Was Used In Attack 250

Posted by samzenpus
from the weapon-of-choice dept.
wiredmikey writes "According to Target Chairman and CEO Gregg Steinhafel, point-of-sale (POS) malware was used in the recent attack that compromised millions of credit and debit card account numbers of customers across the country. Steinfhafel told CNBC's Becky Quick in an interview that malware was used in attacks that compromised the company's point of sale registers. According to a report from Reuters, Target and Neiman Marcus may not be alone, as other popular U.S. retailers may have been breached during the busy the holiday shopping season. According sources who spoke to Reuters, attackers used RAM scraper, or Memory parser malware to steal sensitive data from Target and other retail victims. Visa issued alerts about attacks utilizing these types of malware in April 2013 and again in August 2013. Memory parser malware targets payment card data being processed 'in the clear' (unencrypted) in a system's random access memory (RAM). 'The malware is configured to hook into a payment application binary responsible for processing payment transactions and extracts the systems memory for full track data,' Visa explained in a security advisory."

Hokey religions and ancient weapons are no substitute for a good blaster at your side. - Han Solo