Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 18 declined, 13 accepted (31 total, 41.94% accepted)

Submission + - Stephen King quits Facebook over concerns of 'false information' (cnn.com)

CaptainDork writes: Stephen King has quit Facebook after voicing concerns about false information and privacy.
"I'm quitting Facebook," the author said on Twitter Friday. "Not comfortable with the flood of false information that's allowed in its political advertising, nor am I confident in its ability to protect its users' privacy. Follow me (and Molly, aka The Thing of Evil) on Twitter, if you like."

Submission + - Hackers target NFL teams on Twitter ahead of Super Bowl (cnet.com)

CaptainDork writes: The Twitter accounts of several NFL teams were hacked on Monday ahead of this weekend's Super Bowl game. Around 15 teams, including the Green Bay Packers, Chicago Bears, Dallas Cowboys and San Francisco 49ers, were all targeted. The accounts had their profile images removed and some included messages from OurMine, the Saudi Arabia-based hacker group that appears to be responsible.

"We are here to show people that everything is hackable," a message on a handful of hacked accounts reads. "To improve your accounts security contact us." The message includes an email address and Twitter handle for OurMine, though the account was suspended.

Submission + - How a Whale Crashed Bitcoin to Sub-$7,000 Overnight (newsbtc.com) 1

CaptainDork writes: Bitcoin lost billions of dollars worth of valuation within a 30-minutes timeframe as a Chinese cryptocurrency scammer allegedly liquidated its steal via over-the-counter markets. The initial sell-off by PlusToken caused a domino effect, causing mass liquidations.

PlusToken, a fraud scheme that duped investors of more than $2bn, dumped huge bitcoin stockpiles from its anonymous accounts, according to Chainalysis.

Submission + - Patch wormable vulnerabilities in Remote Desktop Services (CVE-2019-1181/1182) (microsoft.com)

CaptainDork writes: MSRC / By Simon Pope / August 13, 2019 / Patch, RCE, vulnerability, Windows 10, Windows 7, Windows 8.1, Worm

Today Microsoft released a set of fixes for Remote Desktop Services that include two critical Remote Code Execution (RCE) vulnerabilities, CVE-2019-1181 and CVE-2019-1182. Like the previously-fixed ‘BlueKeep’ vulnerability (CVE-2019-0708), these two vulnerabilities are also ‘wormable’, meaning that any future malware that exploits these could propagate from vulnerable computer to vulnerable computer without user interaction.

The affected versions of Windows are Windows 7 SP1, Windows Server 2008 R2 SP1, Windows Server 2012, Windows 8.1, Windows Server 2012 R2, and all supported versions of Windows 10, including server versions.

Submission + - Capital One Says Hacker Breached Accounts Of 100 Million People; Ex-Amazon Emplo (forbes.com)

CaptainDork writes: Capital One said Monday that sensitive financial information—including social security and bank account numbers—from over 100 million people were exposed in a massive data breach that led to the arrest of former Amazon employee Paige Thompson, a hacker who lives in Seattle.

        The information was taken from credit card applications submitted to the Virginia-based bank from 2005-2019. These included names, addresses, zip codes/postal codes, phone numbers, email addresses, dates of birth and self-reported income.

        Additionally, Capital One said that 140,000 Social Security and 80,000 linked bank account numbers were compromised as well as fragments of transaction data from a total of 23 days during 2016, 2017 and 2018.

        No credit card account numbers or log-in credentials were exposed.

        Individuals whose information was compromised in the breach will be notified by Capital One.

Submission + - Ask Slashdot: Blocking Encryption Of Files/Backups 2

CaptainDork writes: I'm a retired IT guy and ransomware was not a huge thing 3-5 years ago (at least few victims were self-reporting) and I'm very curious about protection schemes. In my, now ancient, world we did not encrypt anything — anywhere. Seems to me the trick would be to mark certain places as "unencryptable," similar to long-time attributes like "hidden," "system," "read-only," ect.

Do solutions exist that would mark local data folders and backup drives as "unencryptable," and if not, do you think it could be done? If so, how?

Submission + - After court order, 3D-printed gun pioneer starts selling CAD files (arstechnica.com) 1

CaptainDork writes: In a surprising announcement, Defense Distributed founder Cody Wilson announced Tuesday that while he would continue to comply with a federal court order forbidding him from internationally publishing CAD files of firearms, he would also begin selling copies of his 3D-printed gun files for a "suggested price" of $10 each.

The files, crucially, will be transmitted to customers "on a DD-branded flash drive" in the United States and won't be available as downloads.

Submission + - This Man's Gun-Loving Friends Were Kicked Off Facebook. So He Started Gunbook. (buzzfeed.com)

CaptainDork writes: A British gun enthusiast whose friends were banned from Facebook for posting pictures of firearms has started his own version of the site for gun lovers.

Called Gunbook, it was set up by David Scott, a 57-year-old shooting instructor who lives in Kilsyth, 20 miles from Dunblane. It went live three weeks ago and he says it already has more than 1,000 members, around 60 of whom are from the US.

Slashdot Top Deals

[We] use bad software and bad machines for the wrong things. -- R.W. Hamming

Working...