Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security

CCC Create a Rogue CA Certificate 300

t3rmin4t0r writes "Just when you were breathing easy about Kaminsky, DNS and the word hijacking, by repeating the word SSL in your head, the hackers at CCC were busy at work making a hash of SSL certificate security. Here's the scoop on how they set up their own rogue CA, by (from what I can figure) reversing the hash and engineering a collision up in MD5 space. Until now, MD5 collisions have been ignored because nobody would put in that much effort to create a useful dummy file, but a CA certificate for phishing seems juicy enough to be fodder for the botnets now."
Space

New Photos of SpaceX's Falcon 9 Assembly 122

RobGoldsmith writes "New images are now available of SpaceX's Falcon 9 being assembled. The images are accompanied with a small update from SpaceX. If there are no unexpected delays, it's possible Falcon 9 will be completely integrated by the end of the year. This update shows real flight hardware and really brings the rocket alive. View images of the Falcon 9 nearing completion now!"
Google

Google Was 3 Hours Away From DOJ Antitrust Charges 221

turnkeylinux writes "Google Inc. and Yahoo! Inc. called off their joint advertising agreement just three hours before the Department of Justice planned to file antitrust charges to block the pact, according to the lawyer who would have been lead counsel for the government. 'We were going to file the complaint at a certain time during the day,' says Litvack, who rejoins Hogan & Hartson today. 'We told them we were going to file the complaint at that time of day. Three hours before, they told us they were abandoning the agreement.'"
Input Devices

Logitech Makes 1 Billionth Mouse 456

Smivs writes "Logitech has hailed as a major landmark the production of their one billionth computer mouse. The news comes at a time when analysts claim the days of the mouse are numbered. 'It's rare in human history that a billionth of anything has been shipped by one company,' said Logitech's general manager Rory Dooley. 'Look at any other industry and it has never happened. This is a significant milestone.' The computer mouse will achieve a milestone of its own next week when it turns 40. It was 9 December 1968 when Douglas C. Engelbart and his group of researchers at Stanford University put the first mouse through its paces."
IT

Exchanging Pictures To Generate Passwords 123

Roland Piquepaille writes "Today, Ileana Buhan, a Romanian computer scientist, is presenting her PhD Thesis at the University of Twente in the Netherlands. She is using biometrics to protect confidential information when it is exchanged between two mobile devices. This is a very innovative approach to security. Buhan's biometric application will generate almost unbreakable passwords from photos taken by the connected users. Here is how it works. 'To do this, two users need to save their own photos on their PDAs. They then take photos of each other. The PDA compares the two photos and generates a security code for making a safe connection.'"
Security

Details of Cyber Storm War Games Released 96

I Don't Believe in Imaginary Property writes "Apparently, the participants in the U.S. 'Cyber Storm' war games are familiar with the Kobayashi Maru, because some of them tried to cheat by hacking the games themselves. They also prepare for some very interesting scenarios. Among other things, the organizers are worried about having too many people on the 'No Fly' list show up at an airport, finding 'mystery liquids' in the subway, and having bloggers reveal the classified location of railcars with hazardous materials. The Department of Homeland Security has already analyzed the results of the games, and plans to hold 'Cyber Storm 2' in March."
The Courts

LimeWire Antitrust Claims Against RIAA Dismissed 67

NewYorkCountryLawyer writes "The antitrust counterclaims imposed by Lime Wire against the RIAA record companies have been dismissed. In a 45-page decision (pdf), the Court relied principally upon the holding of the United States Supreme Court in Bell Atlantic v. Twombly that 'A party's obligation to provide the grounds of his entitlement to relief requires more than labels and conclusions, and a formulaic recitation of the elements of a cause of action will not do.' Ironically, the Twombly decision was the authority upon which the RIAA's copyright infringement complaint was dismissed in Interscope v. Rodriguez."
Privacy

Spy Drones Take to the Sky in the UK 529

Novotny writes to tell us The Guardian is reporting that the UK's has launched a new breed of police 'spy drone'. Originally used in military applications, these drones are being put into use as a senior police officer warns the surveillance society in the UK is eroding civil liberties. In the UK, there are an estimated 4.2 million surveillance cameras already, and you are on average photographed 300 times a day going about your business. Is there any evidence to suggest that this increasingly Orwellian society is actually any safer?"

Linux Snobs, The Real Barriers to Entry 1347

McSnarf writes "It's not Windows. It's not distro wars. Sometimes it's just the arrogant attitude that keeps people from switching from Windows. 'As I spoke to newbies, one Windows user who wanted to learn about Linux shared the encouraging and constructive note (not) he received from one of the project members. The responding note read: "Hi jackass, RTFM and stop wasting our time trying to help you children learn.""

Web Site Attacks Against Unpatched IE Flaw Spike 268

An anonymous reader wrote to mention a Washingtonpost.com article about an increase in attacks against IE users via a critical, unpatched flaw. The bug allows software to be downloaded to the vulnerable PC even if the only act the user takes is browsing to a web site. From the article: "[A] password-stealing program landed on the Windows PC belonging to Reaz Chowdhury, a programmer for Oracle Corp. who works out of his home in Orlando, Fla. Chowdhury said he's not sure which site he browsed in the past 24 hours that hijacked his browser, but he confirmed that the attackers had logged the user name and password for his company's virtual private network (VPN)."

Slashdot Top Deals

"There is such a fine line between genius and stupidity." - David St. Hubbins, "Spinal Tap"

Working...