angry tapir writes: The Australian Securities and Investment Commission (ASIC), a government financial watchdog, is reportedly contemplating the idea of implementing a 500 millisecond delay on trades in an effort to put the brakes on high-frequency trading. ASIC last year knocked back the idea and stated that fears about HFT were overblown. However, in a government inquiry today representatives of the organisation said the idea of a 'pause' is still on the table.
angry tapir writes: Attackers have abused the WordPress pingback feature, which allows sites to cross-reference blog posts, to launch a large-scale, distributed denial-of-service (DDoS) attack, according to researchers from Web security firm Sucuri. The attack involved over 162,000 legitimate WordPress websites being forced to send hundreds of requests per second to a popular WordPress site, preventing access to it for many hours. The attack exploited an issue with the XML-RPC (XML remote procedure call) implementation in WordPress that's used for features like pingback, trackback, remote access from mobile devices and others, and brought back into the spotlight the denial-of-service risks associated with this functionality that have been known since 2007.
angry tapir writes: Drupal, an open source content management system, now powers more than 1 million websites, according to figures released today. As of 15 February, 1,005,489 websites were powered by the CMS, according to the Drupal Association, a non-profit organisation that stewards the project. It's heady stuff for an open source project born out of the desire of its creator, Dries Buytaert, to experiment with Web technologies.
angry tapir writes: As the number of top-level domains undergoes explosive growth, the Internet Corporation for Assigned Names and Numbers (ICANN) is studying ways to reduce the risk of traffic intended for internal network destinations ending up on the Internet via the Domain Name System. Proposals in a report produced on behalf of ICANN include preventing.mail,.home and.corp ever being Internet TLDs; allowing the forcible de-delegation of some second-level domains in emergencies; and returning 127.0.53.53 as an IP address in the hopes that sysadmins will have a WTF moment and Google it.
angry tapir writes: Police in the Australian state of Queensland will employ a handheld laser scanner that can be used to map crime scenes, including in areas where there is no GPS reception. The police will use the Australian developed Zebedee laser scanner: A LiDAR scanner that is mounted on a spring. As a user walks around, the spring moves and the scanner captures the surrounding area. Software processing then uses the data to construct a 3D model. Previously the technology has been used to capture areas of cultural significance, such as the interior of the Leaning Tower of Pisa. As an added bonus, the Zebedee looks ridiculous when in use.
angry tapir writes: LinkedIn is shutting down Intro, its recently launched mobile service for connecting people over email, that raised security concerns. Intro was launched last October and described at the time as a 'dream come true for hackers' The service was made for the iPhone, and was designed to grab LinkedIn profile information and insert it into emails received on phones. The service displayed that information to the recipient from the email's sender if the sender was also on LinkedIn.
angry tapir writes: Oracle is continuing its legal battle against third-party software support providers it alleges are performing such services in a manner that violates its intellectual property. Last week, Oracle sued StratisCom, a Georgia company that offers customers support for Oracle's Solaris OS, claiming it had "misappropriated and distributed copyright, proprietary software code, along with the login credentials necessary to download this code from Oracle's password-protected websites."
angry tapir writes: At least three security companies have scrubbed information related to Target from the Web, highlighting the ongoing sensitivity around one of the largest-ever data breaches. How hackers broke into Target and installed malware on point-of-sale terminals that harvested up to 40 million payment card details is extremely sensitive. Now, details that give insight into the attack are being hastily removed or redacted by security companies.