Hackers Steal Opera-Signed Certificate Through Infrastructure Attack 104

wiredmikey writes "Norwegian browser maker Opera Software has confirmed that a targeted internal network infrastructure attack led to the theft of a code signing certificate that was used to sign malware. 'The current evidence suggests a limited impact. The attackers were able to obtain at least one old and expired Opera code signing certificate, which they have used to sign some malware. This has allowed them to distribute malicious software which incorrectly appears to have been published by Opera Software, or appears to be the Opera browser,' Opera warned in a brief advisory. The Opera breach signals a growing shift by organized hacking groups to target the internal infrastructure network at big companies that provide client side software to millions of end users."

How Not To Be a SEO Spammer 65

An anonymous reader writes "The head of Google's webspam team, Matt Cutts, has blogged about one of his colleagues receiving an email offering SEO services to help the web site www.google.com. The irony wasn't lost on Matt, who has blogged about these emails before. As this article points out, if ever there was evidence that the people who send many of these emails haven't done their homework, this is it."

Buy the WarGames IMSAI 8080 and Possibly Impress Ally Sheedy 103

ilikenwf writes "Todd Fischer, the man behind this iconic prop from WarGames, the movie that spawned countless hackers, has come forward recently to announce its sale in the near future. Interestingly enough, the IMSAI 8080 still works, although the disk drive was damaged in shipping after the movie's conclusion, and was trashed."

Eye Surgery By Magnetically Guided Microbots Moves Toward Clinical Trials 47

Sabine Hauert writes "According to robotics researcher Simone Schürle from ETH Zurich's Multi-Scale Robotics Lab (MSRL), the OctoMag is a magnetic manipulation system that uses electromagnetic coils to wirelessly guide micro-robots for ophthalmic surgery. With this system, mobility experiments were conducted in which a micro-robot with a diameter of 285 um (about four times the width of a hair) was navigated reliably through the eye of a rabbit, demonstrating the feasibility of using this technology in surgical applications."
GNU is Not Unix

When GPL Becomes Almost-GPL — the CSS, Images and JavaScript Loophole 224

New submitter sobolwolf writes "It has been apparent for some time that many developers (mainly theme designers) are split-licensing PHP-based GPL distributions, releasing proprietary files alongside GPL files with the excuse that CSS, JavaScript and Images are 'immunized' from the GPL because they run in the browser and not on the server. This is almost always done to limit the distribution of the entire release, not just the proprietary items (most extensions will not function in any meaningful way without the accompanying CSS, Images and JavaScript). Some of the more popular PHP-based GPL projects, like WordPress, have gone as far as to apply sanctions to developers distributing split-licensed themes/plugins. Others, such as Joomla, have openly embraced the split-licensed model, even changing their extension directory submission rules to cater specifically to split-licensed distributions. In light of all this, I would like to ask the following question: While it seems to be legal to offer split-licensed GPL distributions, is it in the spirit of the GPL for a project such as Joomla (whose governing body has the motto 'Open Source Matters') to openly embrace such a practice when they can easily require that all CSS, Images and JavaScript be GPL (or GPL-compatible) for extensions that are listed on the Joomla Extensions Directory?"

Android On the Desktop 247

puddingebola writes "John Morris at CNET offers a brief review of PC Android devices, many of them hybrids running Windows 8 and Android. From the article, 'Microsoft has spent a lot of time and effort trying to get Windows onto smartphones and tablets — so far without a whole lot to show for it. Now several PC companies are trying the opposite approach, taking the Android operating system and porting it to PCs.' The article reviews the recent releases from HP, Acer, Asus, and Samsung. Does Android creeping onto desktop or 'traditional' PC devices have any kind of possible long term consequences? Could this be a way for Android and Google to develop a larger presence in corporate IT, or could Android ever really supplant the Windows foothold?"

Unlikely Planets Found In Violent Star Clusters 30

astroengine writes "When it comes to forming planets, Mother Nature isn't very picky. Despite horrific conditions inside densely packed open clusters, stars apparently have no problem forming and hanging on to an orbital brood. That's the conclusion from a new study (abstract) that used data collected by NASA's now-dormant Kepler space telescope to hunt for planets in a one-billion-year old open cluster called NGC 6811, a collection of about 70 stars located about 3,400 light years away in the constellation Cygnus."

How Much Is Your Gmail Account Worth To Crooks? 80

tsu doh nimh writes "If you use Gmail and have ever wondered how much your account might be worth to cyber thieves, have a look at Cloudsweeper, a new OAuth service launching this week that tries to price the value of your Gmail address based on the number of retail accounts you have tied to it and the current resale value of those accounts in the underground. From KrebsOnSecurity: 'The brainchild of researchers at the University of Illinois at Chicago, Cloudsweeperâ(TM)s account theft audit tool scans your inbox and presents a breakdown of how many accounts connected to that address an attacker could seize if he gained access to your Gmail. Cloudsweeper then tries to put an aggregate price tag on your inbox, a figure thatâ(TM)s computed by totaling the resale value of other account credentials that crooks can steal if they hijack your email.'" A recent report from Kaspersky (PDF) also highlighted the trend toward phishing attepts targeting Facebook, Google, and Yahoo accounts alongside bank accounts.

Hands-On With Windows 8.1 Preview 505

adeelarshad82 writes "Microsoft launched the preview version of Windows 8.1 at the company's Build conference in San Francisco and early signs show that Microsoft heard the criticisms, and has responded with improvements. The new OS includes a number of changes starting with the return of the Start button and the ability to boot directly to the desktop. However, Microsoft hasn't given up on making the new-style tile and full-screen more usable for all users. If anything, the tile-based Start screen has gotten more flexible, with new smaller and larger tile options. Windows 8.1 also drastically improves built-in search, SkyDrive cloud syncing, mail and Microsoft Music." Microsoft also released a preview of Visual Studio 2013 and .NET 4.5.1, and there's a program that will give developers early access to the PC version of the Kinect sensor. Other tidbits: Windows 8.1 will use a standard driver model for 3-D printers, and it's getting better support for both high-res displays and using multiple displays with different resolutions.
The Internet

Google Adds Data About Malware To Transparency Report 20

Nerval's Lobster writes "Google is adding data about malware to its Transparency Report. For the past seven years, the search-engine giant has offered a Safe Browsing program that warns Web-surfers about unsafe Websites (i.e., those loaded with malware or phishing scams). The new section of the Transparency Report will show how many people see those Safe Browsing warnings on a weekly basis, along with other malware-related tidbits, including Webmaster response times to threats and Website reinfection rates. The data includes malware distribution by autonomous systems, which are one (or more) networks controlled by a single entity such as a university or ISP. 'This data is part of our effort to support a safer and more secure web,' read Google's explanatory note in the Report. 'By sharing information from our scans, we hope to encourage cooperation among those who battle malware.' Google takes all that autonomous system data and breaks it down by country. For example, of the 31 million Websites in the United States scanned by Google, roughly 2 percent host malware. In other words, this data just reinforces what pretty much everybody knows: it's not a safe Internet out there."
The Internet

RMS, Aaron Swartz Among 2013 Internet Hall of Fame Inductees 118

gnujoshua writes "The Internet Hall of Fame inducted 32 new members, today. This years class had a number of 'policy innovators' and activists including Aaron Swartz (posthumous), John Perry Barlow, Jimmy Wales, and Richard M. Stallman. Stallman had this to say upon his induction: 'Now that we have made the Internet work, the next task is to stop it from being a platform for massive surveillance, and make it work in a way that respects human rights, including privacy.'"

AMD Overhauls Open-Source Linux Driver 126

An anonymous reader writes "AMD's open-source developer has posted an incredible set of 165 patches against the Linux kernel that provide support for a few major features to their Linux graphics driver. Namely, the open-source Radeon Linux driver now supports dynamic power management on hardware going back to the Radeon HD 2000 (R600) generation. The inability to re-clock the GPU frequencies and voltages dynamically based upon load has been a major limiting factor for open-source AMD users where laptops have been warm and there is diminished battery power. The patches also provide basic support for the AMD Radeon HD 8000 'Sea Islands' graphics processors on their open-source Linux driver."

Black Hat Talks To Outline Attacks On Home Automation Systems 79

colinneagle writes "If you use the Z-Wave wireless protocol for home automation then you might prepare to have your warm, fuzzy, happiness bubble burst; there will be several presentations about attacking the automated house at the upcoming Las Vegas hackers' conferences Black Hat USA 2013 and Def Con 21. For example, CEDIA IT Task force member Bjorn Jensen said, 'Today, I could scan for open ports on the Web used by a known control system, find them, get in and wreak havoc on somebody's home. I could turn off lights, mess with HVAC systems, blow speakers, unlock doors, disarm alarm systems and worse.' Among other things, the hacking Z-Wave synopsis adds, 'Zigbee and Z-wave wireless communication protocols are the most common used RF technology in home automation systems...An open source implementation of the Z-wave protocol stack, openzwave, is available but it does not support the encryption part as of yet. Our talk will show how the Z-Wave protocol can be subjected to attacks.'"

HP Confirms Backdoor In StoreOnce Backup Products 45

wiredmikey writes "Security response personnel at HP are 'actively working on a fix' for a potentially dangerous backdoor in older versions of its StoreOnce backup product line. The company's confirmation of what it describes as a 'potential security issue' follows the public disclosure that malicious hackers can use SSH access to perform full remote compromise of HP's StoreOnce backup systems. The SHA1 hash for the password was also published, putting pressure on HP to get a fix ready for affected customers. SecurityWeek has confirmed that it is relatively trivial to brute-force the hash to obtain the seven-character password. The HP StoreOnce product, previously known as HP D2D, provides disk backup and recovery to small- to midsize businesses, large enterprises, remote offices and cloud service providers."

Cray X-MP Simulator Resurrects Piece of Computer History 55

An anonymous reader writes "If you have a fascination with old supercomputers, like I do, this project might tickle your interest: A functional simulation of a Cray X-MP supercomputer, which can boot to its old batch operating system, called COS. It's complete with hard drive and tape simulation (no punch card readers, sorry) and consoles. Source code and binaries are available. You can also read about the journey that got me there, like recovering the OS image from a 30 year old hard drive or reverse-engineering CRAY machine code to understand undocumented tape drive operation and disk file-systems."

New World Record For Electric Car Speed: 204.2 MPH 99

Dupple writes with this excerpt from the BBC: "Drayson Racing Technologies has broken the world land speed record for a lightweight electric car. Its Lola B12 69/EV vehicle hit a top speed of 204.2mph (328.6km/h) at a racetrack at RAF Elvington in Yorkshire. ... The previous 175mph record was set by Battery Box General Electric in 1974. Drayson Racing is not the only electric vehicle-maker hoping to use motorsport to spur on adoption of the technology. Last week Nissan unveiled the Zeod RC (Zero Emission On Demand Racing Car), which can switch between electric and petrol power. The firm intends to enter the vehicle into next year's Le Mans 24 race saying the competition would act as a 'challenging test bed' for technologies that could eventually find their way into road cars." This video from last year introduces the Lola; Drayson's YouTube channel has plenty more footage, too.

Monty Suggests a Business-Friendly License That Trends Open 43

An anonymous reader writes "Want to gain some of the benefits of open source software development but not sure how to finance it? According to Monty Widenius, creator of MySQL and MariaDB, one solution could be the 'business source' license. While 'open source friendly' rather than open source, Monty blogged, it is intended to offer a viable alternative for companies that want to 'do development and compete with closed source companies on similar economic terms.' Business source starts out with similar benefits as an OSD-compliant license: the source code is visible and can be used freely by all but a small segment that has to pay (the developing company chooses the segment). Then, after a few years, the license automatically changes to an open source license. Monty recently explained the details of business source, and gave a sample license. (Oh, and not to worry, he notes – MariaDB is and will remain GPL.)"

Was That A Tsunami? 79

Rebecka Schumann writes "The East Coast was hit by a tsunami earlier this month, but apparently, no one was the wiser. According to the National Oceanic and Atmospheric Administration a rare six-foot wave collided with the region in early June, a phenomenon currently under review. The wave is being considered 'complex' and is believed to have been caused 'the slumping at the continental shelf east of New Jersey' or a strong storm according to the West Coast and Alaska Tsunami Warning Center. While speculation regarding the mystery tsunami is rampant, another individual is claiming the surge could possibly be a 'meteotsunami,' meaning it was not caused by seismic activity but merely a change in meteorological conditions. Paul Whitmore, an NOAA tsunami center director, said a weather system's ability to change air pressure is enough to 'generate waves that act just like tsunamis.' The alleged tsunami caused three divers to be swept off rocks, two reportedly requiring medical attention after suffering from non life-threatening injuries due the storm. The tsunami, which also caused damage to boats and docks, reportedly lasted a total of five minutes." For less obtrusive advertising, see similar stories at The Verge, and at NPR.
Open Source

Rise of the ARM Clones 78

An anonymous reader writes "Clones of the ARM processor intellectual property are again becoming available for free from the open source hardware community. ARM was rigorous in shutting cloners down in the past but the clones are rising again under codenames Amber, Storm and Atlas, albeit of older instruction set architectures."
United States

Supreme Court Overturns Defense of Marriage Act 1073

12 U.S. states have adopted same-sex marriage over the past decade, and many other states have adopted legislation specifically intended to prevent same-sex marriages from being performed or recognized within their borders. The landscape has just changed on that front, though: the 1996 Defense of Marriage Act, which barred federal recognition of same-sex marriages, has been ruled unconstitutional by the U.S. Supreme Court; here's the ruling itself. From the NBC News version of the story: "The decision was 5-4, written by Justice Anthony Kennedy. “'DOMA instructs all federal officials, and indeed all persons with whom same-sex couples interact, including their own children, that their marriage is less worthy than the marriages of others,' the ruling said. 'The federal statute is invalid, for no legitimate purpose overcomes the purpose and effect to disparage and to injure those whom the State, by its marriage laws, sought to protect in personhood and dignity.'" One major area this affects is tax law; that's one of the salient points in U.S. v. Windsor, the case that drove the court's conclusion. There's more on the story at many major news outlets, and at law-centric sources like SCOTUSblog. The Boston Globe is also live blogging various reactions.

Update: 06/26 16:58 GMT by T : In a separate decision, the court disappointed supporters of California's Proposition 8, a law passed by voter initiative, under which "only marriage between a man and a woman is valid or recognized in California." The court ruled that the private parties which had taken up the Prop 8 banner did not have standing to do so; as the story says, "The 5-4 decision avoids, for now, a sweeping conclusion on whether same-sex marriage is a constitutional "equal protection" right that would apply to all states."

Former Scientologist: CoS Told Brin It Wanted Only "Good" Search Results 205

An anonymous reader writes "Former Scientologist at the highest level Geir Isene reveals that he was brought in to educate top Scientology officials about the Internet, and learned that they had met personally with Google's Sergey Brin (YouTube video), asking him if it were possible for the search giant to filter results so that only positive information about the church would be returned on the word 'Scientology.' You can imagine how that went over. Isene also says that he begged the church's officials to give him a full day to explain the Internet to them before they met with the Electronic Frontier Foundation, which had regularly criticized the church for its stands against Internet freedom. Apparently, the church is missing Isene's counsel, because just a few days ago, the EFF put the Church of Scientology into its 'Takedown Hall of Shame.' Last month Geir published his journey 'From Independent Scientologist to Just Me' under the GPL v3 license, recognising how being an open source advocate helped with that."

FCC Considering Proposal For Encrypted Ham Radio 371

Bruce Perens writes "FCC is currently processing a request for rule-making, RM-11699 (PDF), that would allow the use of Amateur frequencies in the U.S. for private, digitally-encrypted messages. Encryption is a potential disaster for ham radio because it defeats its self-policing nature. If hams can't decode messages, they can't identify if the communication even belongs on ham radio. A potentially worse problem is that encryption destroys the harmless nature of Amateur radio.There's no reason for governments to believe that encrypted communications are harmless. See hams.com/encryption/ for more information."

Internet Villain of the Year Stephen Conroy Resigns 67

An anonymous reader writes "Australian Communications Minister and [2009's] Internet Villain of the Year Stephen Conroy has resigned after his patron was booted out by her party. Conroy gained infamy through his repeated attempts to censor the internet and more recently silent web site blocking, web snooping and data retention. His national broadband network remains controversial."

YouTube Removes Video of Reactions To Being Videoed 229

theodp writes "To follow-up on an earlier Slashdot post, GeekWire reports that YouTube has removed Surveillance Camera Man's latest video of people's sometimes-violent reactions to being videoed, citing its policy of prohibiting content designed to harass, threaten or bully ("This video has been removed as a violation of YouTube's policy prohibiting content designed to harass, bully or threaten"). In a neat coincidence, the YouTube ban comes just after similar complaints were lodged against Google Glass. 'Some people also seem to feel threatened by Google Glass,' Philip De Cortes wrote in Google Glass Will Fail. 'They wonder if they're being recorded, and they feel like the tool could be used against them in some way.'"

Proof Mooted For Heisenberg's Uncertainty Principle 158

ananyo writes "Encapsulating the strangeness of quantum mechanics is a single mathematical expression. According to every undergraduate physics textbook, the uncertainty principle states that it is impossible to simultaneously know the exact position and momentum of a subatomic particle — the more precisely one knows the particle's position at a given moment, the less precisely one can know the value of its momentum. But the original version of the principle, put forward by physicist Werner Heisenberg in 1927, couches quantum indeterminism in a different way — as a fundamental limit to how well a detector can measure quantum properties. Heisenberg offered no direct proof for this version of his principle. Now researchers say they have such a proof. (Pre-print available at the arXiv.) If they're right, it would put the measurement aspect of the uncertainty principle on solid ground — something that researchers had started to question — but it would also suggest that quantum-encrypted messages can be transmitted securely."

Why Engineering Freshmen Should Take Humanities Courses 564

Lasrick sends in an article from John Horgan at Scientific American explaining why he thinks engineering freshmen should make a bit of space in their course-load for the humanities. Quoting: "But it is precisely because science is so powerful that we need the humanities now more than ever. In your science, mathematics and engineering classes, you're given facts, answers, knowledge, truth. Your professors say, 'This is how things are.' They give you certainty. The humanities, at least the way I teach them, give you uncertainty, doubt and skepticism. The humanities are subversive. They undermine the claims of all authorities, whether political, religious or scientific. This skepticism is especially important when it comes to claims about humanity, about what we are, where we came from, and even what we can be and should be. Science has replaced religion as our main source of answers to these questions. Science has told us a lot about ourselves, and we’re learning more every day. But the humanities remind us that we have an enormous capacity for deluding ourselves."
Internet Explorer

IE 11 Getting WebGL, SPDY/3, New Dev Tools 119

rescendent writes sends this report about new features in Internet Explorer 11: "Microsoft released Windows Server ("Blue") to MSDN subscribers today, ahead of the BUILD conference later this week in San Francisco. The build provides us a number of clues as to what we will see in the official Windows 8.1 (Blue) preview. The server build number is 9341, the Windows 8.1 preview build will be: 6.3.9431.winmain_bluemp.130615-1214. IE11 scores 351/500 + 2 bonus point, and 25/25 for WebGL. Since this is a server build, the score may be a little higher than IE11 on Win 8.1, but this confirms WebGL for IE11. IE11 WebGL Conformance Test Results: 14,748 of 20,509 tests pass (71.9%). Many things seen in the Server 2012 R2 preview will also show up in the Windows 8.1 preview."

ICANN Working Group Seeks To Kill WHOIS 155

angry tapir writes "An Internet Corporation for Assigned Names and Numbers working group is seeking public input on a successor to the current WHOIS system used to retrieve domain name information. The Expert Working Group on gTLD Directory Services has issued a report that recommends a radical change from WHOIS, replacing the current system with a centralized data store maintained by a third party that would be responsible for authorizing 'requestors' who want to obtain domain information."

Slashdot Top Deals