Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security

Amazon Confirms EC2/S3 Not PCI Level 1 Compliant 157

Jason writes "After months of digging though speculation and polar opposite opinions from PCI experts, I finally sent a direct request to Amazon's AWS sales team asking if they are in fact PCI compliant and will provide documentation attesting that they are as is required by PCI guidlines. I fully expecting them to dodge the question and refer me to a QSA, but to my relief, they replied with a refreshingly honest and absolute confirmation that it is currently impossible to meet PCI level 1 compliance using AWS services for card data storage. They also very strong suggest that cardnumbers never be stored on EC2 or S3 as those services are inherently noncompliant. For now at least, the official verdict is if you need to process credit cards, the Amazon cloud platform is off the table."
Books

Open Source Textbook For Computer Literacy? 95

dcollins writes "The college where I work has decided to forego ordering a textbook for the computer class that I teach this fall. Does anyone know of a free, open-source textbook for basic computer literacy concepts (overview of hardware, software, operating systems, and file systems)?"
Security

Feds At DefCon Alarmed After RFIDs Scanned 509

FourthAge writes "Federal agents at the Defcon 17 conference were shocked to discover that they had been caught in the sights of an RFID reader connected to a web camera. The reader sniffed data from RFID-enabled ID cards and other documents carried by attendees in pockets and backpacks. The 'security enhancing' RFID chips are now found in passports, official documents and ID cards. 'For $30 to $50, the common, average person can put [a portable RFID-reading kit] together,' said security expert Brian Marcus, one of the people behind the RFID webcam project. 'This is why we're so adamant about making people aware this is very dangerous.'"
Earth

Expedition To Explore an Alaska-Sized Plastic "Island" 325

Peace Corps Online writes "An expedition called Project Kaisei has departed bound for the Great Pacific Garbage Patch — a huge 'island' of plastic debris in the Pacific Ocean estimated to be the size of Alaska (some estimates place it at ten times that size). The expedition will study the impact of the waste on marine life, and research methods to clean up the vast human-created mess in the Pacific. The BBC quotes Ryan Yerkey, the project's chief of operations: 'Every piece of trash that is left on a beach or ends up in our rivers or estuaries and washes out to the sea is an addition to the problem, so we need people to be the solution.' The garbage patch occupies a large and relatively stationary region of the North Pacific Ocean bound by the North Pacific Gyre, a remote area commonly referred to as the horse latitudes. The rotational pattern created by the North Pacific Gyre draws in waste material from across the North Pacific Ocean, including the coastal waters off North America and Japan. As material is captured in the currents, wind-driven surface currents gradually move floating debris toward the center, trapping it in the region. 'You are talking about quite a bit of marine debris but it's not a solid mass,' says Yerkey. 'Twenty years from now we can't be harvesting the ocean for trash. We need to get it out but we need to also have people make those changes in their lives to stop the problem from growing and hopefully reverse the course.'"
Google

Google Latitude Arrives For the iPhone — As a Web App 195

An anonymous reader writes "After months of waiting, the Google Latitude social maps service finally arrived for the iPhone ... but thanks to an Apple rejection of the natively developed app, it's a web app. Says Google on their blog, 'We worked closely with Apple to bring Latitude to the iPhone in a way Apple thought would be best for iPhone users. After we developed a Latitude application for the iPhone, Apple requested we release Latitude as a web application in order to avoid confusion with Maps on the iPhone.' But it gets worse for iPhone users: 'Unfortunately, since there is no mechanism for applications to run in the background on iPhone (which applies to browser-based web apps as well), we're not able to provide continuous background location updates in the same way that we can for Latitude users on Android, BlackBerry, Symbian and Windows Mobile.' Latitude has been sprouting new features lately and is an interesting take on social networking, but it looks like Apple is determined to ensure its users only get a seriously crippled implementation compared to the Android and WinMo versions. PC World put it less politely than Google did, saying, 'Google's new Latitude Web app for iPhone is so hamstrung that Apple customers may be wishing they had a BlackBerry or Android handset instead.'"

Comment Re:News at 11 (Score 1) 553

Um, hire intelligent users? We know that isn't going to happen though. So take your password, keep it in your wallet. You don't leave that laying around, do you?

Or, have one master password (use that for your machine password), and PasswordSafe to store all your other passwords. You can remember one password, right? Even if it's slightly complex?

Security requires all parties to work together, or it's useless and easy to circumvent.

Security

iPhone Vulnerability Yields Root Access Via SMS 186

snydeq writes "Pwn2Own winner Charlie Miller has revealed an SMS vulnerability that could provide hackers with root access to the iPhone. Malicious code sent by SMS to run on the phone could include commands to monitor location using GPS, turn on the phone's microphone to eavesdrop on conversations, or make the phone join a DDoS attack or botnet, Miller said. Miller did not provide detailed description of the SMS vulnerability, citing an agreement with Apple, which is working to fix the vulnerability in advance of Black Hat, where Miller plans to discuss the attack in greater detail. 'SMS is a great vector to attack the iPhone,' Miller said, as SMS can send binary code that the iPhone processes without user interaction. Sequences can be sent to the phone as multiple messages that are automatically reassembled, thereby surpassing individual SMS message limits of 140 bytes."
Censorship

Man Attacked In Ohio For Providing Iran Proxies 467

David Hume writes "electronicmaji is reporting on the Daily Kos that the individual known as ProtesterHelp (also to be found on twitter) was attacked in Ohio for providing network security for Twitterers in Iran, setting up private networks to provide secure proxies, calling for media networks to remove the Iranians Twitterers' information from their broadcast, and providing counter-intelligence services (including Basiji and Army Locations) within the Twitter community. ProtesterHelp was allegedly attacked by a group of men while walking to class in Ohio. The men, who appeared to ProtesterHelp to be either Iranian or Lebanese, drove up beside him and threw rocks at him while shouting, 'Mousavi Fraud.' ProtesterHelp further reported that his personal information has been leaked, and is currently being spread both online and inside of Iran amongst the government." Relatedly, Wired is also reporting that Google and Facebook have rushed out support for Persian. This move has allowed many pro-democracy groups to connect and translate their message to a broader audience.
Hardware Hacking

Making a Child Locating System 1092

celtic_hackr writes "Well, I never thought I'd be an advocate for placing GPS devices on people. However, since it took less than three days for my local school district to misplace my daughter, I have decided that something needs to be done. By the school district's own admission it has a recurring problem of placing children on the wrong buses. Fortunately, my daughter was located, with no thanks to the local school district. Therefore, I would like input on a way to be able to keep track of my child. I know there are personal tracking devices out there. I have nothing against these systems. But I want more than this. My specification are: 1) a small unobtrusive device I can place on my daughter, 2) an application to pull up on any computer, a map with a dot indicating the real-time position of my child, 3) a handheld device with the equivalent information, 4) [optional] a secure web application/plug-in I can install on my own domain allowing me to track her from anyplace in the world, 5) a means of turning it all off, 6) a Linux based solution of the above. I believe all the pieces for making such a system are out there. Has anyone built anything like this? Is there an open source solution? How would I go about building my own? Has anyone hacked any of these personal trackers before, to serve their own purposes? How does a tinfoil hat wearer engineer such a device to make sure Big-Brother isn't watching too? Can these devices be locked down so only certain devices can pick up the GPS location of an individual locator? What other recommendations do you have?"

Slashdot Top Deals

egrep -n '^[a-z].*\(' $ | sort -t':' +2.0

Working...