Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security

Submission + - "Pharming" : Almost 80 Cisco routers vulne

coondoggie writes: "Cisco today issued a warning that almost 80 of its Small Office/Home Office (SOHO), Remote Office/Branch Office (ROBO) and Teleworker business routers may be vulnerable to a new JavaScript-based security threat dubbed "Drive-by Pharming." Symantec and the Indiana University School of Informatics coined the term Pharming in a report and white paper issued last week. As discussed here, "drive-by pharming" lets a hacker change the DNS settings on a user's home broadband router or wireless access point. The attack is possible whenever a broadband router is not password protected or the attacker manages to guess the password. http://www.networkworld.com/community/?q=node/1169 1"
Security

Submission + - Google Maps used to locate phishing victims

Damon Hastings writes: http://www.techworld.com/security/news/index.cfm?n ewsID=8077

Okay, the story here is that it is once again possible to download a trojan merely by visiting a web page. All articles I've found have unfortunately focused on a single exploit of this vulnerability, and thus the articles are nearly irrelevant. The vulnerability is what matters. If it isn't patched soon, you could see millions of infections from more creative exploits in the very near future. If any hacker is able to smuggle the trojan onto even a single major website, he could net millions of victims.

Does anyone know which vulnerability is being used? Or what browser(s) are affected? Is it just Internet Explorer 6? IE7? How long has Microsoft known about this vulnerability, and when will they fix it (or have they already?) I can't find any useful articles on the net — they're all just clones of this one.

The Google maps bit is of course completely irrelevant — the ability to map IP addresses to physical locations has been widely and publicly available since before Google existed. Google has no culpability here, despite the misleading reporting done by the major news agencies.
Enlightenment

Submission + - Livestock's Contribution to Global Warming

Aqua_boy17 writes: The Christian Science Monitor is reporting that people who eat meat are responsible for about 1.5 tons more of carbon dioxide being put in to the atmosphere each year than their vegan counterparts. The article cites a recently released report from the UN's Food and Agriculture Orginization stating that livestock raised for human consumption is now responsible for as much as 18% of total greenhouse gases emitted annually. While livestock animals are responsible for about 9% of total Carbon Dioxide release, they're also blamed for nearly 40% of the total methane and 65% of the total amount of Nitrous Oxide released into the environment. When added together the amount of total greenhouse gas emissions produced as a byproduct of raising livestock is already greater than all current modes of transportation combined, and is expected to rise in the future.
Portables (Apple)

Submission + - WoW on an iPhone?

AT22 writes: "Ok so I was listening to a WoW podcast last night and they said that there have been rumors that WoW will work and can be played on an iPhone. I was wondering if you guys think this is a possibility? If so do any of you have any idea how you would get the game imported onto and iPhone please tell me b/c I am a huge WoW fan and would love to play the game on a machine this portabel. Thanks"
Security

Submission + - SETI@Home tracks stolen laptop, reunites couple

yuna49 writes: Thieves recently stole a laptop belonging to the estranged wife of a computer programmer in Minnesota. Luckily the husband had installed SETI@Home on the machine. He saw the computer appear on the SETI site three times in a week and gave the IP address to the authorities. This lead to the recovery of the laptop and a reconciliation between the estranged couple.
Security

IT Departments Fear Growing Expertise of Users 499

flatfilsoc recommends a long article in CIO magazine on users who know too much and the IT leaders who fear them. Dubbing the universe of consumer technology the "shadow IT department," the article highlights the extent to which the boundary between users' workplace and home have broken down. It notes the increasing clash — familiar to anyone who works in a company with an IT department — between users' home-grown productivity boosters and IT's mandate to protect corporate data. The inherent tendency of the IT department to want to crack down and control technology that it doesn't supply should be resisted at all costs, according to CIO. The article outlines strategies for co-existence. It just might persuade some desperate CIO somewhere not to embark on a career-limiting path of decreeing against gmail and IM.
The Internet

Charter Implements SiteFinder-Like DNS 206

paulbiz writes "Charter Cable's DNS servers have just started resolving all invalid hostnames and pointing them to their own error page. The About page states: 'This service automatically eliminates many of the error pages you may encounter as you surf the web. No software was installed on your computer for this service to work.' It has an 'opt-out' page, but when you use it Charter simply sets a cookie that makes their page redirect errors to Microsoft Live Search instead!" One more reason to use OpenDNS, where you can actually opt out of the custom error page.

Is A Bad Attitude Damaging The IT Profession? 892

dtienes writes "Why does IT get a free pass to insult users? Slamming customers isn't acceptable in any other profession; doctors don't call their patients "meatbags" — at least, not publicly. But IT professionals think nothing of wearing their scorn on their sleeves (or at least their chests — just check out ThinkGeek). There's more at stake here than just a few hard feelings. IT may be seriously damaging the credibility of the profession. See the essay I'm An Idiot (And Other Lessons From The IT Department) for a former IT professional turned user's take on insults, attitudes and ethics. (Full disclosure: The submitter is also the author.)"
Security

AJAX May Be Considered Harmful 308

87C751 writes "Security lists are abuzz about a presentation from the 23C3 conference, which details a fundamental design flaw in Javascript. The technique, called Prototype Hijacking, allows an attacker to redefine any feature of Javascript. The paper is called 'Subverting AJAX' (pdf), and outlines a possible Web Worm that lives in the very fabric of Web 2.0 and could kill the Web as we know it."

Life Without Traffic Signs 604

zuikaku writes, "Der Spiegel has an article titled European Cities Do Away with Traffic Signs reporting that seven cities and regions in Europe are doing away with traffic signs, signals, painted lines, and even sidewalks. With the motto 'Unsafe is Safe,' the idea is that, when faced with an uncertain, unregulated situation, drivers will be naturally cautious and courteous. Then again, they may end up with streets jammed with pedestrians, bicyclists, and cars like some places in India and China." I can't see this idea getting traction in the U.S.

Handling Corporate Laptop Theft Gracefully 197

Billosaur writes "From NPR, we get a Marketplace story about the theft of corporate laptops and the sensitive data they may contain, specifically how to handle the repercussions. From the story: 'TriWest operates in about 21 states. It's based in Phoenix, Arizona. In December of 2002, somebody broke into the company's offices and stole two computer hard drives.And those hard drives contained the personal information of 550,000 of our customers from privates in the military all the way up to the chairman of the Joint Chiefs of Staff.' How they handled the situation earned them an award from the Public Relations Society of America."

Apple to Face iPod Clone Attack 394

chr1sb writes "The Age has a commentary piece outlining how Apple's domination of the online media market is continuing to grow, but speculating that significant competition from the likes of Nokia and Motorola will rapidly relegate Apple's presence in the market to a corner, just as clone manufacturing of IBM PCs dominated the initial success of the Macintosh. From the article: 'The iPod/iTunes system will move into a niche with Macintosh computers because Steve Jobs has again stuck with closed architecture and total control. This will happen quickly because mobile phones are being turned over about every year.'."

Slashdot Top Deals

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (5) All right, who's the wiseguy who stuck this trigraph stuff in here?

Working...