Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
Security

Malware Uses Router LEDs To Steal Data From Secure Networks (bleepingcomputer.com) 105

An anonymous reader writes: Researchers from the Ben-Gurion University of the Negev in Israel have developed malware that when installed on a router or a switch can take control over the device's LEDs and use them to transmit data in a binary format to a nearby attacker, who can capture it using simple video recording equipment. The attack is similar to the LED-it-GO attack developed by the same team, which uses a hard drive's blinking LED to steal data from air-gapped computers. Because routers and switches have many more LEDs than a hard drive, this attack scenario is much more efficient, as it can transmit data at about the same speed, but multiplied by the number of ports/LEDs. Researchers say they were able to steal data by 1000 bits/ per LED, making this the most efficient attack known to date. The attack worked best when coupled with optical sensors, which are capable of sampling LED signals at high rates, enabling data reception at a higher bandwidth than other typical video recording equipment. A video of the attack is available here.

Comment Matter of Law (Score 2) 173

Their argument citing that case is pretty weak. In that case, Publisher's International published a book about the TV show Twin Peaks, after the show came out. A very in-depth book citing plots, actors, dialogue, etc. Although Publisher's International didn't have copies of the script, they did copy basically the TV show after it came out. In this case it would be very hard to prove that the website had any such access, especially since the Walking Dead show has not come out yet. They probably haven't even registered their copyright. Plus it is obviously commentary on the show. However these days the one with the deepest pocket wins in court, sadly.

-Matt

Comment Re:Foresee MIT offering affordable online degrees? (Score 1) 55

MIT is already doing this. For Supply Chain Logistics MIT has already added on two more classes and with a final exam you can get a Micro Masters in Supply Chain and with one more semester on campus you can get a full Masters degree in Logistics.

Eventually, you will be able to do this completely online.

-Matt

Comment Nutritionism (Score 4, Interesting) 425

This sort of story smacks of "Nutritionism" as explained in Michael Pollan's book 'In Defense Of Food'. Generally people do not need to know how many calories, carbs, nutrients, vitamins, etc. are in a piece of food unless you are a nutritionist, and most people aren't. How to eat healthy comes down to one simple rule:

Eat food(1) mostly plants(2) not too much(3).

(1) Food defined by things your great-grandmother would recognize as being food. Nothing overly processed. Food should spoil. If what you eat will not spoil you should not eat it. Things that are not food, but edible food-type substances: refined sugar (includes soda, twinkies, etc), refined flour (white bread, etc), refined oils of all kinds (peanut oil, sunflower oil, and *gasp* olive oil).

(2) Plants, meaning whole fruits, vegetables, nuts, and legumes. And a variety. Different shapes, textures, colors, whole and fresh if you can get it. This should make up 90% of your diet. Less than 10% of your diet should come from animal products. This includes dairy and meat.

(3) Don't eat too much of one thing. Don't overeat.

If you do this, you don't need to count calories or take vitamins or worry about your riboflavin intake. Just eat and be healthy.

-Matt

Comment Pouring money into a myth (Score 3, Interesting) 162

This would be great, but it is likely not true. According to more recent research kid's learning styles is not true. This theory has been reported as fact, but is not backed up by science. In fact it is better to get a kid out of their comfort zone for them to learn more.

https://thinkneuroscience.word...

-Matt

Security

Exploiting Wildcards On Linux/Unix 215

An anonymous reader writes: DefenseCode researcher Leon Juranic found security issues related to using wildcards in Unix commands. The topic has been talked about in the past on the Full Disclosure mailing list, where some people saw this more as a feature than as a bug. There are clearly a number of potential security issues surrounding this, so Mr. Juranic provided five actual exploitation examples that stress the risks accompanying the practice of using the * wildcard with Linux/Unix commands. The issue can be manifested by using specific options in chown, tar, rsync etc. By using specially crafted filenames, an attacker can inject arbitrary arguments to shell commands run by other users — root as well.

Comment Future Babble (Score 1) 155

"The course of human history is strongly influenced by the growth of human knowledge. [But it is impossible to] predict by rational or scientific methods, the future growth of our scientific knowledge [because doing so would require us to know that future knowledge, and, if we did, it would be present knowledge, not future knowledge.] We cannot therefore predict the future course of human history." - Karl Popper paraphrased from the book Future Babble by Dan Gardner

This is why Cryonics is currently a waste of money and resources.

-Matt

Earth

Aral Sea May Recover; Dead Sea Needs a Lifeline 131

An anonymous reader writes "It's a tale of two seas. The drying up of the Aral Sea is considered one of the greatest environmental catastrophes in history, but the northern sector of the sea, at least, is showing signs of life. A dam completed in 2005 has increased the North Aral's span by 20 percent, and birds, fish, and people are all returning to the area. Meanwhile, the Dead Sea is still in the midst of precipitous decline, since too much water is being drawn out of the Jordan River for thirsty populations and crops. To keep the sea from shrinking more, scientists are pushing an ambitious scheme called the 'Red-Dead conduit,' which would channel huge amounts of water from the Red Sea to the Dead Sea. However, the environmental consequences of such a project may be troubling."
Encryption

Cryptographically Hiding TCP Ports 206

JohnGrahamCumming writes "The shimmer project implements a cryptographically-based system for hiding important (e.g. SSH) open ports in plain sight. By automatically forwarding from a range of ports all but one of which are honeypots and by changing the ports every minute only a user knowing a shared secret can determine the location of the real SSH server."

Slashdot Top Deals

Research is what I'm doing when I don't know what I'm doing. -- Wernher von Braun

Working...