Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Submission + - Vault 7: CIA Has Malware for Hacking Air-Gapped Networks via USB Thumb Drives (bleepingcomputer.com)

An anonymous reader writes: WikiLeaks dumped today the manuals of several hacking utilities part of Brutal Kangaroo, a CIA malware toolkit for hacking into air-gapped (offline) networks using tainted USB thumb drives. The CIA uses these tools as part of a very complex attack process, that allows CIA operatives to infect offline, air-gapped networks.

The first stage of these attacks start with the infection of a "primary host," an Internet-connected computer at a targeted company. Malware on this primary host automatically infects all USB thumb drives inserted into the machine. If this thumb drive is connected to computers on an air-gapped network, a second malware is planted on these devices.

This malware is so advanced, that it can even create a network of hacked air-gapped PCs that talk to each other and exchange commands. To infect the air-gapped computers, the CIA malware uses LNK (shortcut) files placed on the USB thumb drive. Once the user opens and views the content of the thumb drive in Windows Explorer, his air-gapped PC is infected without any other interaction.

Submission + - SPAM: The trouble with geoengineers "hacking the planet"

Dan Drollette writes: Despite all the hype, geoengineering would not be simple or easy, or a one-time solution, or buy us any time. Instead, "hacking the planet" would be a difficult undertaking that humanity would have to commit to essentially forever—and still not fix the underlying problem. Assuming it even works.
Link to Original Source

Submission + - Password Reset MITM: Exposing The Need For Better Security Choices (helpnetsecurity.com)

Orome1 writes: The Password Reset Man in the Middle attack exploits the similarity of the registration and password reset processes. To launch such an attack, the attacker only needs to control a website. To entice victims to make an account on the malicious website, the attacker can offer free access to a wanted resource. Once the user initiates the account registration process by entering their email address, the attacker can use that information to initiate a password reset process on another website that uses that piece of information as the username (e.g. Google, YouTube, Amazon, Twitter, LinkedIn, PayPal, and so on). Every request for input from that site is forwarded to the potential victim, and then his or her answers forwarded back to that particular site.

Submission + - Device allows police to view phone activity during a traffic stop (hackread.com) 1

dcsmith writes: Textalyzer is an electronic tablet size device which will allow the law enforcement in the United States to see if drivers have been using their cellphones whilst driving. That’s not all; the device aims to crack down suspects by recording their every click, tap or swipe. It would even know what apps the drivers are using. Police officers can also download all the data from the suspect’s smartphone within a few seconds right on the spot.

Submission + - The US Government Wants To Permanently Legalize the Right to Repair (vice.com)

An anonymous reader writes: In one of the biggest wins for the right to repair movement yet, the US Copyright Office suggested Thursday that the US government should take actions to make it legal to repair anything you own, forever—even if it requires hacking into the product's software. Manufacturers—including John Deere, Ford, various printer companies, and a host of consumer electronics companies—have argued that it should be illegal to bypass the software locks that they put into their products, claiming that such circumvention violated copyright law. Thursday, the US Copyright Office said it's tired of having to deal with the same issues every three years; it should be legal to repair the things you buy—everything you buy—forever. "The growing demand for relief under section 1201 has coincided with a general understanding that bona fide repair and maintenance activities are typically noninfringing," the report stated. "Repair activities are often protected from infringement claims by multiple copyright law provisions." "The Office recommends against limiting an exemption to specific technologies or devices, such as motor vehicles, as any statutory language would likely be soon outpaced by technology," it continued.

Comment Re:So... the time has come... (Score 1) 91

Yeah, Steve Jobs was the genius driving Apple - proven after being fired then returning and taking Apple to the stratosphere.
Personally I think AAPL is a long term short now - they are obviously still riding Steve's coattails as he did the best he could to set them up to do so; but without a once-in-a-lifetime visionary genius, they are nothing special.

Submission + - NVIDIA Unveils Tesla V100 AI Accelerator Powered By 5120 CUDA Core Volta GPU (hothardware.com)

MojoKid writes: NVIDIA CEO Jen-Hsun Huang just offered the first public unveiling of a product based on the company's next generation GPU architecture, code named Volta. NVIDIA just announced its new Tesla V100 accelerator that's designed for AI and machine learning applications and at the heart of the Tesla V100 is NVIDIA's Volta GV100 GPU. The chip features a 21.1 billion transistors on a die that measures 815mm2 (compared to 12 billion transistors and 610mm2 respectively for the previous gen Pascal GP100). The GV100 is built on a 12nm FinFET manufacturing process by TSMC. It is comprised of 5,120 CUDA cores with a boost clock of 1455MHz, compared to 3585 CUDA cores for the GeForce GTX 1080 Ti and previous gen Tesla P100 AI accelerator, for example. The new Volta GPU delivers 15 TFLOPS FP32 compute performance and 7.5 TFLOPS of FP64 compute performance. Also on board is 16MB of cache and 16GB of second generation High Bandwidth (HBM2) memory with 900GB/sec of bandwidth via a 4096-bit interface. The GV100 also has dedicated Tensor cores (640 in total) accelerating AI workloads. NVIDIA notes the dedicated Tensor cores also allow for a 12x uplift in deep learning performance compared to Pascal, which relies solely on its CUDA cores. NVIDIA is targeting a Q3 2017 release Tesla V100 with Volta, but the timetable is for a GeForce derivative of consumer graphics cards is has not been disclosed.

Submission + - Did Trump fire Comey as part of a cover-up? (thebulletin.org)

Dan Drollette writes: As much as the Bulletin of the Atomic Scientists is concerned with global threats—nuclear weapons, climate change, and other technologies that could end or seriously diminish human civilization—it is even more focused on the management of those dangers. Governments, after all, choose whether to start nuclear wars. Simply put, preserving humanity over the long term requires good governance.

Submission + - How One Little Cable Company Exposed Telecom's Achilles' Heel (backchannel.com)

mirandakatz writes: Forget net neutrality—the real fight is over controlling price-gouging monopolies. As Susan Crawford writes at Backchannel, a little-known cable company, Cable One, just exposed the telecommunications industry's Achilles' heel: regulation. Cable One has been raising it's data transmission prices quickly, and it's making cable giants very, very nervous. If people begin noticing that there’s no competition, that Americans are paying too much for too little, and that the entire country is suffering as a result, that’s a big problem for Big Cable. As Crawford writes, "don’t fixate on net neutrality...Even though the state of internet access is an issue that touches the bank accounts and opportunities of hundreds of millions of Americans and gazillions of businesses, very few people understand what’s actually going on. Now you are among them. Do something about it."

Submission + - Targeted, high-energy cancer treatments get a supercomputing boost (utexas.edu)

aarondubrow writes: Over the last century, radiation therapy has greatly improved and become a highly effective way to treat cancer. However, physicians must still walk a fine line between delivering enough radiation to kill tumors, while sparing surrounding healthy tissue. New radiation systems — including proton beam therapy and MR-linac (magnetic resonance imaging/linear accelerator) — can better target cancer cells, but are still being explored and optimized. Researchers from Mayo Clinic, MD Anderson Cancer Center and Texas Tech University are using supercomputers at the Texas Advanced Computing Center to test, plan treatments and understand the fundamental science behind these emerging technologies.

Slashdot Top Deals

What this country needs is a good five dollar plasma weapon.

Working...