Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 121 declined, 109 accepted (230 total, 47.39% accepted)

×
Security

Submission + - Can you trust Chinese computer equipment? (itworld.com)

Ian Lamont writes: Suspicions about China slipping eavesdropping technology into computer exports have been around for years. But the recent Chinese spying attacks on Google and other Internet companies have revived the hardware spying concerns. An IT World blogger suggests the gear can't be trusted, noting that it wouldn't be hard to add security holes to the firmware of Chinese-made USB memory sticks, computers, hard drives, and cameras. He also implies that running automatic checks for data of interest in the compromised gear would not be difficult.
Java

Submission + - Oracle unplugs Project Wonderland (itworld.com)

Ian Lamont writes: Oracle has announced it is dropping support for Sun Microsystems' Project Wonderland. The Java-based virtual world developed some interesting features, such as voice communication with distance attenuation and phone-based access, but with Oracle's acquisition and integration of Sun, it seems that Wonderland didn't have a place in Oracle's strategic plans. An official blog post says a core group hopes to keep Wonderland going, and will be pursuing for-profit and not-for-profit options.
Communications

Submission + - Asterisk vishing attacks "endemic" (thestandard.com)

Ian Lamont writes: Remember the report last year that the FBI was concerned about a "vishing" exploit relating to the Asterisk IP PBX software? Digium played down the report, noting that it was based on a bug that had already been patched, but now the company's open-source community director says that attacks on Asterisk installations are 'endemic.' There have been dozens of reported vishing attacks in recent weeks, says the article:

The victims typically bank with smaller regional institutions, which typically have fewer resources to detect scams. Scammers hack into phone systems and then call victims, playing prerecorded messages that say there has been a billing error or warn them that the bank account has been suspended because of suspicious activity. If the worried customer enters his account number and ATM password, the bad guys use that information to make fake debit cards and empty their victim's bank accounts.

The article adds that businesses can prevent many of these attacks by changing the port they use for SIP connections on their VoIP systems, by blocking connections after a certain number of failures, and by simply using better passwords on their voice systems.

Businesses

Submission + - The alternate reality of e-commerce for cars (thestandard.com)

Ian Lamont writes: Even though the Web has been around for more than 15 years, when it comes to online auto sales in the United States, all roads lead still to local dealerships, at least when new car sales are involved. Many times during that period the auto industry and online players such as Amazon have created online sales models that incorporate local dealers, but none have been a great success. Consider the recent GM/eBay trial that managed to sell 13 cars in the last two weeks of operation. While 13 cars would be OK for a single dealership, the experimental program covered the entire state of California, and involved 21,000 listings. Is there any hope for the system to change, perhaps using a model from another country, or new technologies? Or will American consumers be forced to deal with real-world dealerships whenever they want to buy a new car for the foreseeable future?
Microsoft

Submission + - Microsoft: "Shame on us" for Vista rollout snafus (itworld.com)

Ian Lamont writes: Microsoft has admitted that the way it handled previous operating system launches to business customers was flawed and says the company has learned from the botched rollout of Vista in 2006. A Microsoft product executive gave several examples, such as customers being forced to wait for independent software vendor support and a service pack release, and said "shame on us, we've learned our lesson." Not surprisingly, the same company official promised that Windows 7 will be a much better experience for business customers and urged them to start their migrations now, even before the official Oct. 23 launch. That's a six-week head start, which should be more than enough time to handle the reported 20-hour upgrade process that impacts even high-end hardware.
Businesses

Submission + - Zer01 service still vapor, distributors empty-hand (thestandard.com)

Ian Lamont writes: "Zer01's "unlimited everything" mobile phone service is looking shaky, after leadership changes at its parent company, Global Verge, and warnings from observers that had previously praised the planned service. There were signs of trouble last month, but the new developments cast doubt about whether the Zer01 service will ever see the light of day."
United States

Submission + - FCC to probe exclusive mobile deals (thestandard.com)

Ian Lamont writes: "The Federal Communications Commission is planning on launching an investigation into exclusive handset deals between mobile carriers and handset makers. In a speech on Thursday, acting FCC Chairman Michael Copps said the agency "should determine whether some of these arrangements adversely restrict consumer choice or harm the development of innovative devices, and it should take appropriate action if it finds harm." It's not hard to imagine who might be targeted — At a separate Senate Committee on Commerce hearing on Thursday, much of the discussion centered on AT&T's exclusive deal to carry the iPhone. AT&T claimed "consumers benefit from exclusive deals in three ways: innovation, lower cost and more choice," but carriers and senators from states with large rural populations disagreed, saying that their customers had no choice when it came to the iPhone — it's not available because AT&Ts network doesn't reach these areas. One panelist also brought up the Carterfone precedent (PDF), which concerned an "electrical acoustic coupling device" that a man named Tom Carter developed in the 1950s to let field workers make phone calls using a radio tranceiver connected to AT&T's phone network. AT&T, which was then a monopoly, claimed no foreign devices could be connected to its network, but lost when it challenged the Carterfone in court. The result spurred innovation such as the fax machine."
Security

Submission + - Investigators replicate Nokia 1100 banking hack (thestandard.com)

Ian Lamont writes: "Investigators have duplicated an online banking hack using a 2003-era Nokia mobile phone. Authorities had been aware for some time that European gangs were interested in buying the phone, and were finally able to confirm why: It can be used to access victims' bank accounts using "special software written by hackers." The hack apparently works by letting criminals reprogram the phones to use someone else's phone number and receive their SMS messages, including mTANs (mobile transaction authentication numbers) from European banks. However, the only phones that work are 1100 handsets (pictures) made in a certain factory. Nokia had claimed last month it had no idea why criminals were paying thousands of euros to buy the old handsets."
Businesses

Submission + - AT&T sends mixed message on behavioral adverti (thestandard.com)

Ian Lamont writes: "An advertising company that runs a "targeting marketplace" and partner AT&T are playing down the telecommunications giant's use of its services, after AT&T's chief privacy officer told a House subcommittee yesterday that the company does not engage in behavioral advertising. The AT&T executive testified to the House of Representatives Subcommittee on Communications, Technology and the Internet that AT&T would not use behavioral advertising methods without informed customer consent. However, AudienceScience, a company that records "billions of behavioral events daily" has apparently worked for AT&T since 2005. After the hearing, AudienceScience removed a client testimonial relating to AT&T from its website, so "all the appropriate parties [have] consistent messaging," its CEO said. An AT&T spokesman also said that the testimony was talking about AT&T's role as an ISP, not an advertiser."
The Media

Submission + - Paid online news venture fails to get subscribers (thestandard.com)

Ian Lamont writes: "The idea of migrating people from free online news content to paid subscriptions has been dealt a blow. A venture meant to fill the void left by the print Rocky Mountain Times has attracted 3,000 subscribers — just 6% of its original goal of reaching 50,000 paid subscribers by Thursday. InDenverTimes.com is currently free, but the plan was to have gated premium content starting next month for a $5/month subscription. The project has entrepreneurial backing and articles from journalists who used to work for the print-focused Rocky Mountain News, which closed last month. However, a lack of paying subscribers and low online ad rates means that the venture might have to scale back its ambitions."
The Military

Submission + - The military's 5 lb missile (latimes.com)

Ian Lamont writes: "The LA Times has a story this morning about the military's Spike missile program. It weighs just 5 pounds and about two feet long, compared to the 100 pound Hellfire currently used on unmanned Predator aircraft in Afghanistan and Iraq. It's also supposed to be cheaper — the article says $5,000 per missile, thanks to the Spike's off-the-shelf chips and components. The Spike's explosive payload is probably not enough to take out a tank, but may be able to destroy a moving pickup truck. If the tests are successful, the program could allow Predators to carry as many as a dozen Spikes, compared to just two or three Hellfires. The missiles could also be fitted onto smaller UAVs which are not able to carry heavier weapons."
Microsoft

Submission + - "Apple tax" report backfires on Microsoft (thestandard.com)

Ian Lamont writes: "A Microsoft-sponsored report that describes a hidden "Apple tax" has fallen flat among the technology press. Roger Kay's report (PDF) compares various PC and Mac configurations, and claims an all-Apple household's costs would add up to an extra $3,367 over five years. Tech columnists and bloggers have slammed the comparisons and claims made in the report — even Mac-baiter John C. Dvorak calls it propaganda. However, some Mac fans still see a pro-Microsoft press conspiracy. Even if the comparisons are questionable, Kay's report and the accompanying television ads have clearly struck a nerve among the Mac faithful."
IBM

Submission + - IBM tries to patent offshoring (thestandard.com)

Ian Lamont writes: "IBM has filed a patent application that covers offshoring employees. Application 20090083107, dated March 26, 2009, is a "method and system for strategic global resource sourcing." Figure 2 gives a pretty good idea of what's involved — it shows boxes labelled "Engineer," "HR," and "Programmer" with crossing arrows pointing to cylinders labelled "India," "China," and "Hungary." The article speculates that IBM may apply the methodology to its own staff — it reportedly plans to lay off thousands of employees and has even started a program to have IBM workers transfer to other countries at local wages."
The Media

Submission + - David Pogue's secret weapon: Patience (thestandard.com)

Ian Lamont writes: "Paul Boutin has written an interesting analysis of David Pogue, the New York Times tech columnist who is responsible for introducing millions of people to various gadgets, software, and websites. Unlike most tech writers who want to demonstrate how savvy they are, Pogue waits until there is a critical mass of actual support before weighing in, and often takes the approach of a clueless newbie:

This week, David Pogue finally writes about netbooks, a topic the Standard has been pummeling for months. Pogue's shtick is clever: He plays the role of the buffoon who has belatedly wandered into the action long after he should have, much like P.J. O'Rourke covering the Middle East for Rolling Stone in the 1980s. Like O'Rourke, Pogue serves as a proxy for his reader: Not an insider, but an outsider with questions that would make insiders roll their eyes in contempt.

Pogue takes the hit for his readers. They're not the early adopters on Geoffrey Moore's technology adoption curve. They're the pragmatists and conservatives. The mass market. The horde of buyers who actually make gadget manufacturers rich. Pogue lets them feel normal which, statistically, they are. He answers the questions they've only now come around to asking out loud.

Of course, there are many other ways to create a widely read tech column, such as winding up Mac users and submitting content to Slashdot. Pogue hasn't had to resort to either tactic, although it's not uncommon for readers to submit his reviews to Slashdot on their own."

The Almighty Buck

Submission + - eBay describes scale of counterfeit goods problem (thestandard.com)

Ian Lamont writes: "As the Tiffany vs. eBay lawsuit winds its way through a federal appeals court, eBay has trotted out some numbers that show how many sellers attempt to sell fake goods on the site. Millions were delisted last year, and tens of thousands of accounts were suspended after reports were made to eBay's Verified Rights Owner program, which lets trademark owners notify eBay of fake goods being sold on the site. eBay says 100% of reported listings were removed from the site last year, most within 12 hours, and the company uses sellers' background information to make sure that they don't create new accounts to sell delisted items. Tiffany brought the suit against eBay in 2004, alleging that eBay was turning a blind eye to counterfeit luxury goods and demanding that eBay police its listings for bogus goods. Tiffany lost the case last July, and will shortly present its arguments to the U.S. Court of Appeals for the Second Circuit in New York."

Slashdot Top Deals

And it should be the law: If you use the word `paradigm' without knowing what the dictionary says it means, you go to jail. No exceptions. -- David Jones

Working...