Forgot your password?
typodupeerror
Security

Hacking Team Hacked, Attackers Grab 400GB of Internal Data 95

Several readers sent word that notorious surveillance company Hacking Team has itself been hacked. Attackers made off with 400GB worth of emails, documents, and source code. The company is known for providing interception tools to government and law enforcement agencies. According to the leaked files, Hacking Team has customers in Egypt, South Korea, Kazakhstan, Saudi Arabia, Oman, Lebanon, Mongolia, Russia, Germany, Sudan, and the United States — to name a few. It has been labeled an enemy of the internet by Reporters Without Borders. "Clients have had their passwords exposed as well, as several documents related to contracts and configurations have been circulating online." Nobody knows yet who perpetrated the hack.

Comment For all the negatives... (Score 1) 398

... here is a positive: Colin McRae's Dirt2: the game feels so polished on the PC that I'd think it was designed for it.

Another negative: NFS shift: there's no way to avoid watching the 10 second or so video clip at the start and re-start of every race if you don't press the 'A' button... which it seems cannot be mapped to the keyboard or to a button on a non-xbox controller... very annoying when trying and re-trying to get a race right.

Tip: With the pinnacle game profiler program and enough patience you can customize your controller to cover for the lack of attention the game developers put on the port to the PC.

Comment Great (Score 2, Insightful) 225

More distractions for drivers will eventually mean more cyclists being killed on the road. Looking on the bright side, this could accelerate the eventual transition towards having computers assume control of vehicles on the streets.
Unix

Why Do We Name Servers the Way We Do? 1397

jfruhlinger writes "If you use a Unix machine, it probably has a funny name. And if you work in an environment where there are multiple Unix machines, they probably have funny names that are variations on a theme. No, you're not the only one! This article explores the phenomenon, showing that even the CIA uses a whimsical server naming scheme." What are some of your best (worst?) naming schemes?
Security

The Real Story On WPA's Flaw 67

Glenn Fleishman writes "The reports earlier today on WPA's TKIP key type being cracked were incorrect. I spoke at length with Erik Tews, the joint author of the paper that discloses a checksum weakness in TKIP that allows individual short packets to be decrypted without revealing the TKIP key. I wrote this up for Ars Technica with quite a bit of background on WEP and WPA. Tews's paper, co-written with Martin Beck, whom he credits as discovering and implementing a working crack (in aircrack-ng as a module), describes a way to use a backwards-compatible part of TKIP to exploit a weakness that remains from WEP. ARP packets and similarly short packets can be decoded. Longer packets are likely still safe, and TKIP hasn't been cracked. Don't believe the hype, but the exploit is still notable."

Slashdot Top Deals

Asynchronous inputs are at the root of our race problems. -- D. Winker and F. Prosser

Working...