Forgot your password?
typodupeerror

Submission + - HTTP/2 Zero-Day Exploited to Launch Largest DDoS Attacks in History (securityweek.com)

wiredmikey writes: A zero-day vulnerability named ‘HTTP/2 Rapid Reset’ has been exploited by malicious actors to launch the largest distributed denial-of-service (DDoS) attacks in internet history. One of the attacks seen by Cloudflare was three times larger than the record-breaking 71 million requests per second (RPS) attack reported by company in February. Specifically, the HTTP/2 Rapid Reset DDoS campaign peaked at 201 million RPS, while Google’s observed a DDoS attack that peaked at 398 million RPS. The new attack method abuses an HTTP/2 feature called ‘stream cancellation’, by repeatedly sending a request and immediately canceling it.

Submission + - Some dead stars may harbor enough uranium to set off a thermonuclear bomb (sciencemag.org)

sciencehabit writes: A thermonuclear bomb might be ticking deep in the cores of some dead stars. A new theoretical study traces out how certain stellar corpses known as white dwarfs could accumulate a critical mass of uranium that would trigger a massive supernova explosion.

The findings could yield insights into the destruction habits of white dwarfs, which are responsible for creating heavy elements like iron and nickel. White dwarf supernovae light up their surroundings with the power of 5 billion Suns, and astronomers have used them as “standard candles” to measure vast distances across the cosmos. But such blasts are still not entirely understood, and the new study could account for certain, anomalously dim observations of this type of supernovae.

Submission + - Sony Won't Back Down on $1,400.00 in Charges Made to Grandmothers's Credit Card (ctvnews.ca) 5

theshowmecanuck writes: A grandmother let her 13 year old grandson use her credit card to buy added content for one of his games for which she thought would be a $15 charge. After the account opened up because of the credit card on it, he started downloading other things not realizing they were adding substantial charges to her credit card. She asked Sony to refund the charges, it's not like they can't disable the added content if they wanted, but they told her basically too bad so sad.

Submission + - Chalking tires to enforce parking rules is unconstitutional, court finds (nbcnews.com)

schwit1 writes: Marking your tires with chalk is trespassing, not law enforcement, the federal appeals panel said in a Michigan case.

U.S. Circuit Judge Bernice Bouie Donald wrote that when drivers pull into parking spaces, "the city commences its search on vehicles that are parked legally, without probable cause or even so much as 'individualized suspicion of wrongdoing' — the touchstone of the reasonableness standard."

Moreover, overstaying your welcome at a parking space doesn't cause "injury or ongoing harm to the community," she wrote, meaning the city is wrong to argue that parking enforcement is part of its "community caretaking" responsibility, potentially justifying a search without a warrant.

In fact, she wrote, "there has been a trespass in this case because the City made intentional physical contact with Taylor's vehicle."

Comment I was there... And it did not happen that way. (Score 1) 149

I was one of the leading team members at System Development Corporation (SDC) in the 1970's on various secure operating system and secure networking projects for various US and UK governmental bodies.

Some of that work was classified, much was not.

In late 1974 David Kaufman and I were working on network security, particularly on the then monolithic TCP (there was at that time no formalized underlying datagram IP layer.) Among other things we were designing and building a multi-level secure nework, with multi-level verifiied secure switches/routers, for a goverment agency.

In our work we split an encrypted datagram layer off from the underside of TCP. Because of nature of packet ordering, packet loss, retransmissions, as well as aspects of various security algorithms this was not as straightforward as one might think.

What we came up with was a precursor to what are today encrypted VLANS, IPSEC, and key distribution infrastructures.

However, we were not able to publish our work widely. In fact now, 40 years later, there is scarcely anything visible on the public web. Even our work that was published via the then National Bureal of Standards (now NIST) is not easily found. (I have been searching for years for a copy of some work I did on debugging hooks for secure operating systems.)

We also worked on things like capability based computers and operating systems with formal verfication of security properties. During that time I designed and wrote what is aguably the first formally verified secure operating system.) That work, also, tends to remain hard to find.

Vint Cerf was a consultant to our group. He helped. But the major thrust and principle design work was done by our team at SDC.

The US Dept of Defense (which includes several agencies) funded much of this work - and really helped move things along - but their institutional resistence to wide publication meant that many of the ideas and implementations we did in the mid 1970's were invisible to most of the world until they were re-invented decades later.

Comment Opposite viewpoint (Score 1) 63

I have long held that competing DNS root systems *can* work - and in fact have been working for long time.

The issue is not whether there is one singular catholic DNS root, but rather the degree of consistency between competing roots.

We all accept that internet users dislike surprise - they will not like any DNS root that give surprising (or misleading or fraudulent answers). That's why any DNS root that gives surprising DNS answers will quickly be shunned.

What is intriguing about competing DNS roots is that they provide a way around ICANN and around ICANN's choices - and ICANN's fees and ICANN's trademark-over-everything-else policies.

I wrote a note on this topic some years ago - "What would the internet be like had there been no ICANN?" at http://www.cavebear.com/cbblog-archives/000331.html

Comment IP multicast - prior art? (Score 2) 325

IP multicast has been in active use on the internet since the 1980's.

IP multicast lets receivers join groups, defined by a special class of IP addresses. Senders emit packets addressed to those addresses and the IP mulitcast routing systems (of which there are several) build distribution trees to get those packets to those receivers.

So to the extent that this patent claims include subscription based addressing and transmission of data packets, IP multicast has been a running example of this for at least a quarter of a century.

Comment Your past becomes visible (again) (Score 1) 56

All those security cameras out there are recording everyone. And a lot of that footage is retained.

With this kind of technology all of that past footage could be scanned and a dossier of past whereabouts created.

(Yes, I know that our mobile phones are already reporting on our whereabouts, but at least you can turn a phone off.)

Cloud

Facebook Wants To Buy Skype 192

An anonymous reader writes "Remember when we learned that Facebook had resumed talks with Skype? Well, it turns out that Facebook is considering buying Skype outright. 'Skype is reportedly talking to Facebook about some sort of deal. Facebook CEO Mark Zuckerberg has been involved in internal discussions about buying Skype, while Facebook also reached out to the Luxembourg-based company about forming a joint venture.'"

Comment Feed 'em false numbers (Score 4, Interesting) 138

It would be easy to set up a weakly protect access point that did nothing but generate bogus transactions with bad credit card numbers - that could pollute the crook's database, particularly if they don't do a good job of recording of which card number came from which network.

And if the bogus numbers were timestamped and logged then when the bad card numbers are used (and bounced) one could use the bounced transactions to build a map of where the crooks were on any given day.

Slashdot Top Deals

As of next week, passwords will be entered in Morse code.

Working...