Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Feed Schneier: Building an Online Lie Detector (schneier.com)

There's an interesting project to detect false rumors on the Internet. The EU-funded project aims to classify online rumours into four types: speculation -- such as whether interest rates might rise; controversy -- as over the MMR vaccine; misinformation, where something untrue is spread unwittingly; and disinformation, where it's done with malicious intent. The system will also automatically categorise sources...

Feed Schneier: NEBULA: NSA Exploit of the Day (schneier.com)

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: NEBULA (S//SI//FVEY) Multi-Protocol macro-class Network-In-a-Box (NIB) system. Leverages the existing Typhon GUI and supports GSM, UMTS, CDMA2000 applications. LTE capability currently under development. (S//SI//REL) Operational Restrictions exist for equipment deployment. (S//SI//REL) Features: Dual Carrier System EGSM 900MHz UMTS 2100MHz CDMA2000 1900MHz Macro-class Base station 32+Km Range Optional Battery...

Feed Schneier: Brian Krebs (schneier.com)

Nice profile of Brian Krebs, cybersecurity journalist: Russian criminals routinely feed Mr. Krebs information about their rivals that they obtained through hacks. After one such episode, he began receiving daily calls from a major Russian cybercriminal seeking his files back. Mr. Krebs is writing a book about the ordeal, called "Spam Nation," to be published by Sourcebooks this year. In...

Feed Schneier: CANDYGRAM: NSA Exploit of the Day (schneier.com)

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: CANDYGRAM (S//SI//REL) Mimics GSM cell tower of a target network. Capable of operations at 900, 1800, or 1900 MHz. Whenever a target handset enters the CANDYGRAM base station's area of influence, the system sends out an SMS through the external network to registered watch phones. (S//SI//REL) Typical use...

Feed Schneier: RCS Spyware and Citizen Lab (schneier.com)

Remote-Controlled System (RCS) is a piece of spyware sold exclusively to governments by a Milan company called Hacking Team. Recently, Citizen Lab found this spyware being used by the Ethiopian government against journalists, including American journalists. More recently, Citizen Lab mapped the software and who's using it: Hacking Team advertises that their RCS spyware is "untraceable" to a specific government...

Feed Schneier: TOTEGHOSTLY 2.0: NSA Exploit of the Day (schneier.com)

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: TOTEGHOSTLY 2.0 (TS//SI//REL) TOTEGHOSTLY 2.0 is STRAITBIZARRE based implant for the Windows Mobile embedded operating system and uses the CHIMNEYPOOL framework. TOTEGHOSTLY 2.0 is compliant with the FREEFLOW project, therefore it is supported in the TURBULENCE architecture. (TS//SI//REL) TOTEGHOSTLY 2.0 is a software implant for the Windows Mobile...

Feed Schneier: TOTECHASER: NSA Exploit of the Day (schneier.com)

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: TOTECHASER (TS//SI//REL) TOTECHASER is a Windows CE implant targeting the Thuraya 2520 handset. The Thuraya is a dual mode phone that can operate either in SAT or GSM modes. The phone also supports a GPRS data connection for Web browsing, e-mail, and MMS messages. The initial software implant...

Feed Schneier: What Information Are Stun Guns Recording? (schneier.com)

In a story about a stolen Stradivarius violin, there's this: Information from a stun gun company, an anonymous tip and hours of surveillance paved the way for authorities to find a stolen 300-year-old Stradivarius violin in the attic of a Milwaukee home, police said Thursday. [...] Taser International, the maker of the stun gun used in the attack, "provided invaluable...

Feed Schneier: PICASSO: NSA Exploit of the Day (schneier.com)

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: PICASSO (S//SI//REL) Modified GSM (target) handset that collects user data, location information and room audio. Command and data exfil is done from a laptop and regular phone via SMS (Short Messaging Service), without alerting the target. (S//SI) Target Data via SMS: Incoming call numbers Outgoing call numbers Recently...

Feed Schneier: Who Should Store NSA Surveillance Data (schneier.com)

One of the recommendations by the president's Review Group on Intelligence and Communications Technologies on reforming the National Security Agency—No. 5, if you're counting—is that the government should not collect and store telephone metadata. Instead, a private company -- either the phone companies themselves or some other third party -- should store the metadata and provide it to the government...

Feed Schneier: MONKEYCALENDAR: NSA Exploit of the Day (schneier.com)

Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog: MONKEYCALENDAR (TS//SI//REL) MONKEYCALENDAR is a software implant for GSM (Global System for Mobile communication) subscriber identity module (SIM) cards. This implant pulls geolocation information from a target handset and exfiltrates it to a user-defined phone number via short message service (SMS). (TS//SI//REL) Modern SIM cards (Phase 2+) have...

Feed Schneier: My Talk on the NSA (schneier.com)

Earlier this month, I gave a talk about the NSA at MIT. The video is available. ETA: The video doesn't display on some Firefox browsers. If you have trouble, try a different browser....

Slashdot Top Deals

Basic is a high level languish. APL is a high level anguish.

Working...