Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security

Submission + - ThinkPad Advanced Mini Dock Hack (youtube.com)

alek202 writes: European Hackers have demonstrated how to hack a ThinkPad Advanced Mini Dock in order to remove a docked and locked ThinkPad without damages from the Dock.

This is an excellent example how security by obscurity works — or doesn't.

Science

Submission + - Nuclear power is safest way to make electricity (washingtonpost.com)

schwit1 writes: Compared with nuclear power, coal is responsible for five times as many worker deaths from accidents, 470 times as many deaths due to air pollution among members of the public, and more than 1,000 times as many cases of serious illness, according to a study of the health effects of electricity generation in Europe.
Android

Submission + - Pirated Android App Shames Freeloaders (hothardware.com)

MojoKid writes: "A pirated version of an Android app is actually a Trojan that shames someone who installs it by sending an SMS message to all his/her contacts telling them of his/her piracy. The original app is called Walk and Text, and costs $2.10 in the Android Market. The app uses the camera on the back of a smartphone to show a user a visual of his upcoming surroundings, which will supposedly prevent the user from running into the street or across a set of train tracks. The pirated version is available from unofficial Android app markets, and once installed redirects the pirate to the legitimate app in the Android Market, while also sending the SMS message to the phone's entire contact list."
Privacy

Submission + - Google Indoors featured on German TV (identityblog.com)

kim cameron writes: Germans woke up yesterday to a headline story on Das Erste’s TV Morning Show announcing a spiffy new Internet service — Google indoors.

Check it out! The navigation features within peoples’ houses are amazing

Security

No JavaScript Needed For New Adobe Exploits 187

bl8n8r writes "More woes for Adobe as a security firm creates a proof-of-concept attack that injects malicious code as part of the update process. The user only needs to click a dialog box to execute the code and no JavaScript is needed to launch the exploit. The exploit affects Foxit as well as Adobe Acrobat software. This exploit is made possible through the host software allowing execution of system binaries. Not clear if it's multi-platform, but seems plausible."
Security

Submission + - Researcher Exploits PDF File w/o A Vulnerability (net-security.org)

An anonymous reader writes: Didier Stevens, security researcher and expert on malicious PDF files, has succeeded in creating a proof-of-concept PDF file that uses the launch action triggered by the opening of the file to execute the embedded malicious executable. What makes this piece of news really interesting is that he didn't exploit a security vulnerability in the PDF file, but he found a way to start the /Launch /Action command and embed the malicious file using a special technique.
Security

Submission + - McAfee: Google Attacks Not the Work of Amateurs (itworld.com)

itwbennett writes: McAfee says Damballa and other companies that followed up on McAfee's "Operation Aurura" research analyzed the wrong malware after McAfee provided wrong filenames. As a result, Damballa concluded that 'the Aurora attacks were the work of somewhat amateur botnet writers' and not the targeted and sophisticated attacks that McAfee was seeing, writes Robert McMillan. McAfee included four filenames in its original Aurora research that it now says are 'unrelated to Aurora and uses a different set of command and control servers,' McAfee Chief Technology Officer George Kurtz said in a Tuesday blog posting.
Image

Man Threatened Spam Attack In $200,000 Extortion Plot 77

52-year-old Anthony Digati was arrested for trying to extort $200,000 from an insurance firm by threatening to spam them with six million emails unless they paid up. Digati said he would use a spam service and his amazing talents as a "huge social networker" to drag the company "through the muddiest waters imaginable" and presumably unfriend everyone. He added that the price would increase to $3 million if they failed to pay up by Monday, according to federal authorities.
Bug

LHC Will Be Shut Down In 2011 Because of "Mistake" 183

astroengine follows up to a story about the LHC shutting down that seems to have hit all the news replicators today. "It's to be expected when pushing the frontiers of physics, but the LHC's epic 'will it or won't it' saga continues. Due to an unforeseen construction mistake, the LHC will cease experiments for a year (starting around late-2011) so repairs and upgrades can be carried out. For now, accelerated particles will have a maximum energy of 7TeV (half the power of the LHC's design maximum), which is ample for at least 18 months of experiments before shutdown."
Programming

Why Paying For Code Doesn't Mean You Own It 447

Barence writes "Why do people think they own code just because they've paid for it? PC Pro's Kevin Partner says many of his clients believe that by paying for the work to be done, they take ownership of it. But, put simply, code is owned by its developer even once the client has paid, unless that developer is legally employed by the client or a contract exists that transfers full ownership (and even then it's far from clear-cut). He discusses the thorny issue of making clients understand that distinction and gives advice on how developers can assert their rights."
Science

New Material Sets Stage For All-Optical Computing 53

An anonymous reader writes with this excerpt from the International Business Times: "Researchers have made a new material that can be used to guide waves of light, a breakthrough that could lead to ultra-fast computing. Georgia Tech scientists are using specially designed organic dyes that can process and redirect light without the need to be converted to electricity first. ... 'For this class of molecules, we can with a high degree of reliability predict where the molecules will have both large optical nonlinearities and low two-photon absorption,' said [Georgia Tech School of Chemistry professor Seth] Marder." According to the article, using an optical router could lead to transmission speeds as high as 2,000 gigabits per second, five times faster than current technology.
Bug

Toyota Black Box Data Is More Closed Than Others' 276

wjr writes "Many cars these days contain black boxes that record information (speed, accelerator position, etc) and can preserve information in the case of an accident. Ford and Chrysler say that they use 'open systems' so anyone can read out the data; General Motors has licensed Bosch to produce a device capable of reading its cars' black boxes. On the other hand, Toyota has only a single laptop in the US capable of reading its cars' black boxes, and generally won't allow the data to be read without a court order. Honda seems to have a similar policy. This is emerging as an issue in the investigation into unintended acceleration."
Handhelds

Apple Removes Wi-Fi Finders From App Store 461

jasonbrown writes "Apple on Thursday began removing another category of apps from its iPhone App Store. This time, it's not porn, it's Wi-Fi. Apple removed several Wi-Fi apps commonly referred to as stumblers, or apps that seek out available Wi-Fi networks near your location. According to a story on Cult of Mac, apps removed by Apple include WiFi-Where, WiFiFoFum, and yFy Network Finder."

Slashdot Top Deals

Scientists will study your brain to learn more about your distant cousin, Man.

Working...