Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Data Storage

Submission + - First Mobile Wireless Storage for iOS (net-security.org)

Orome1 writes: Seagate announced GoFlex Satellite mobile wireless storage, the first battery-powered external hard drive to wirelessly extend the storage capacity of any Wi-Fi enabled mobile device. With 500GB and Wi-Fi access over 802.11 b/g/n and a rechargeable battery, it provides the ability to carry an entire library of files with you. Devices are wirelessly connected directly to the GoFlex Satellite drive by use of the free GoFlex Media app — available now on iTunes and the Apple App Store — or a web browser.
User Journal

Journal Journal: Return of the Modus

Well, I'm back. I just logged in to Slashdot for the first time since ... well, I honestly don't remember, but the last time I posted a comment was in the summer of 2002. (My first comment was in February of 2001 -- good grief, have I been lurking for a decade?)

Note to Self: "Do not read your old comments from 10 years ago." What a rank n00b I was! Luckily, I somehow managed to find employment as a Linux sysadmin. Hopefully I've learned something along the way.

OS X

Submission + - Unicode Control Characters May Camouflage Malware (h-online.com)

modus_operandi writes: (via FARK.com): Clever malware authors have come up with a way to disguise malicious executable files as innocuous data types by writing the file name backwards. On May 11, analysts at Norman ASA (anti-virus software vendor based in Sweden) published details of the exploit in "The RTLO unicode hole — sequence manipulation as an attack vector". The trick is accomplished by using Unicode control characters such as 0x202E (right-to-left override) and 0x202B (right-to-left embedding). Although the payload is likely to be targeted at users of Microsoft Windows operating systems (which rely on filename extensions to determine whether a binary is executable) the exploit also works on any operating system which handles Unicode correctly. That means Linux and UNIX-based operating systems, including Mac OS X, will also be fooled into displaying a deceptive filename. Luckily, it is not possible to set chmod +x as a default in your umask! Could this technique be used in other, heretofore unsuspected, social engineering attacks?

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...