Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 77 declined, 20 accepted (97 total, 20.62% accepted)

×

Submission + - US government secretly removed malware from private computers arrive the world. (nytimes.com)

Albanach writes: The New York Times reports that, in an apparently preemptive move, the US Government obtained both US court approval, and permission from foreign governments to enter private computer networks and remove malware allegedly controlled by the GRU, the intelligence wing of the Russian Military. "The operation is the latest effort by the Biden administration to thwart actions by Russia by making them public before Moscow can strike."

Submission + - Google discovered multi-year attack against iPhones

Albanach writes: Researchers from Google's Project Zero discovered an in-the-wild attack on iPhones that has been ongoing for at least two years. The attacks were untargeted, and "Simply visiting the hacked site was enough for the exploit server to attack your device, and if it was successful, install a monitoring implant." according to Ian Beer a member of the Project Zero task force. The team uncovered "five separate, complete and unique iPhone exploit chains, covering almost every version from iOS 10 through to the latest version of iOS 12" which they believe is part of a sustained effort to hack the users of iPhones in certain communities. The attack was reported to Apple and patched earlier this year.

Submission + - Searching for To-Do/Task List software

Albanach writes: Despite searching, I have not identified a good solution for managing to-do lists, a problem that can't be unique or unusual. For a variety of reasons, I need something I host myself, which allows me to organize tasks, give them due dates and/or priorities and to easily reorganize. I'd prefer a web interface so that I can access my list from home/work/mobile. My searches generally turned up hosted solutions that don't work for privacy reasons, or very old software that has shown no sign of updates in years. What are other slashdotters using to manage their real-world task list?

Submission + - Will Amazon deliver this holiday season?

Albanach writes: Many slashdot users will have found Amazon parcels are no longer delivered by their mail carrier or the familiar brown van. Instead, deliveries are being made by new employees driving white vans, rental vans, mini vans and cars. Amazon Logistics has taken over and many customers have expressed frustration. I thought that perhaps the issues I have experienced are local — in a few months I've had two parcels go MIA and another four delivered late. Today however, the Washington Post has an article about Amazon Key. While not the focus of the article, the author mentions Amazon missing the delivery window on four items. Established carriers have been experiencing the holiday rush for many years, typically beginning their planning and recruitment months in advance, and with many employees who have years of experience to rely on. Can Amazon Logistics carry the web's largest retailer through the upcoming buying frenzy, and what would the cost to Amazon be if they fail?

Submission + - Court releases source code for DNA comparison software

Albanach writes: New York City’s crime lab used genotyping software called the Forensic Statistical Tool (FST) to compare DNA samples. The American Bar Association reports that the software source code was found to be potentially relevant at trial and, following motions by ProPublica, the code has been released and is available on GitHub. While FST is no longer in use in New York City, the software was used in about 1,350 cases over about 5½ years.

Submission + - Remote control of a car, with no phone or network connection required

Albanach writes: Following on from this week's Wired report showing the remote control of a Jeep using a cell phone, security researchers claim to have achieved a similar result using just the car radio. Using off the shelf components to create a fake radio station, the researchers sent signals using the DAB digital radio standard used in Europe and the Asia Pacific region. After taking control of the car's entertainment system it was possible to gain control of vital car systems such as the brakes. In the wild, such an exploit could allow widespread simultaneous deployment of a hack affecting huge numbers of vehicles.

Submission + - Following EU ruling, BBC article excluded from Google searches. 1

Albanach writes: In 2007, the BBC's economics editor, Robert Peston, penned an article on the massive loses at Merrill Lynch and the resulting dismissal of their CEO Stan O'Neil. Today, the BBC have been notified that the 2007 article will no longer appear in some Google searches made within the European Union, apparently as a result of someone exercising their new-found 'right to be forgotten'. O'Neil was the only individual named in the 2007 article. While O'Neil has left Merrill Lynch, he has not left the world of business, and now holds a directorship at Alcoa, the world's third largest aluminum producer with $23 billion in revenues in 2013.

Submission + - FTC sues T-Mobile over bogus charges

Albanach writes: The FTC has filed a lawsuit alleging that T-Mobile charged customers millions of dollars for premium rate spam text messages the customers neither wanted, nor signed up for. In response, T-Mobile point out that, unlike other major carriers they stopped billing for these services last year, and put in place procedures to enable customers to obtain refunds. Despite these measures, coverage in The Wire stated the FTC has determined T-Mobile not only refused refunds, but many of those who did receive refunds only received a fraction of the cost.

Submission + - E-ink reader for academic papers

Albanach writes: Recently, I purchased an e-ink Kindle. I like real paper books, but I’m reading lots of academic papers. The Kindle is a nice way to carry and read them, and I went through several documents, highlighting important passages. Now I learn that there is no supported way to actually get a highlighted personal document back off of the Kindle with the highlights intact. I don’t need lectures about DRM, proprietary software or anything else along those lines — there are other things the Kindle can and will be used for. What I would like to know is whether there’s another e-ink reader that DOES let you add your own documents, then highlight them and export the altered document. Or does someone know of a way to achieve this using the Kindle itself?
Encryption

Submission + - WW2 pigeon code decrypted by Canadian? (bbc.co.uk)

Albanach writes: At the start of November Slashdot reported the discovery of a code, thought to be from the second world war, found attached to the leg of a pigeon skeleton located in an English chimney. Now a Canadian by the name of Gord Young claims to have deciphered the message in less than 20 minutes. He believes that the message is comprised mostly of acronyms.

Submission + - Options for FOSS remote support software? 1

Albanach writes: I'm sure I'm not alone in being asked to help friends and family with computer issues. These folk typically run Windows (everything from XP onward) or OS X (typically 10.4 onward). Naturally, desktop sharing is often much easier than trying to talk the other end through various steps. I've found free sites like join.me but they don't work with OS X 10.4, neither does the Chrome plugin. I'd also prefer not to compromise security by using a third party in the middle of the connection. Is there a good, free solution I can run on my linux box that supports old and new clients that run Windows, OS X and possibly linux? I'd love it if the users could simply bring their systems up to date, but that doesn't solve the third party issue and it's not easy when it requires a non-trivial RAM upgrade on a Mac Mini.

Submission + - Apple ban security expert for exposing iOS flaw (msn.com) 1

Albanach writes: Reuters is reporting that Apple has expelled Charlie Miller, a researcher with Accuvant Labs and highly regarded cybersecurity expert from its iOS developers' programs. The move comes after he publicly demonstrated a flaw in its iOS operating system. Miller disclosed that he had figured out a way to build apps that can secretly download other programs that are capable of stealing data, sending text messages or destroying information. After disclosing the flaw via YouTube, Apple retaliated by banning Miller from the developer program for at least one year.

Submission + - Open source for severe weather warnings?

Albanach writes: Tornadoes have caused devastating loss of life in the United States this year. While I'm fortunate to be unaffected, I was wondering whether open source technology can help distribute severe weather warnings. While large companies can use commercial products to alert staff, tools like asterisk should allow small and medium businesses to send phone and text alerts to staff. The challenge is getting warnings in timely fashion. The National Weather Service provides XML data, however the update frequency of every few minutes could be too slow for an event like a tornado. The obvious source seems to be receiving alerts in real time from the NWS weather radio. Unfortunately I have been unable to find an open source solution that can process an audio stream, reading the SANE header and allowing for an automated response. Have any /. readers tackled this problem at work or at home?
Apple

Submission + - What happens when an App Store app has a bug. (apple.com)

Albanach writes: Many software developers have grown accustomed to the release early and often model of software development. However, deploying rapid updates is not possible when your application first needs approval by Apple. At the weekend Friendly, one of the iPad's most popular Facebook clients, and the #9 top grossing app of 2010 was upgraded. Either as a result of this, or as a result of changes made by Facebook, users were left with a broken App. The developers claim they submitted a fixed version for approval on Saturday. They told their 3 million Facebook followers on Sunday that Apple had promised to prioritize the approval. The App has still not been approved, leaving customers with a useless App. Does Apple's slow approval process demand a return to an older model of development with longer testing phases?
Encryption

Submission + - Successful compromise of quantum encryption (nature.com)

Albanach writes: Nature magazine is reporting that, by utilizing lasers, Norwgian 'hackers' have successfully cracked their encryption keys in a quantum encryption solution, yet left no trace of the hack. Vadim Makarov who with colleagues from the Norwegian University of Science and Technology in Trondheim carried out the exploit is quoted saying 'Our hack gave 100% knowledge of the key, with zero disturbance to the system.' He describes the technique as exploiting 'a purely technological loophole that turns a quantum cryptographic system into a classical system, without anyone noticing.'

Slashdot Top Deals

"Sometimes insanity is the only alternative" -- button at a Science Fiction convention.

Working...