Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Submission + - Apple announces a trade-in program for 3rd party chargers 1

EliSowash writes: In response to recent reports of safety concerns around 3rd party chargers for iDevices, Apple announced today that beginning August 16, 2013, you can trade in your 3rd party adapter and purchase an official Apple charger at a “special price” — $10 USD.

From their website: “To qualify, you must turn in at least one USB power adapter and bring your iPhone, iPad, or iPod to an Apple Retail Store or participating Apple Authorized Service Provider for serial number validation. The special pricing on Apple USB power adapters is limited to one adapter for each iPhone, iPad, and iPod you own and is valid until October 18, 2013.”

Submission + - Operation b58 takes down Bamital botnet (symantec.com)

EliSowash writes: "This week the Botnet known as Bamital has been reported dead by the two warriors that claim to have killed it: Symantec and Microsoft. A six-week monitoring period of Balmital revealed 1.8 million unique IP addresses communicating with its command and control server, Symantic says. That resulted in an average of three million clicks hi-jacked per day. Owners of infected computers trying to complete a search query will now be directed to an official Microsoft and Symantec webpage that explains the problem and provides information and resources to remove the Bamital infection and other malware from their computers."

Submission + - New Ransomware Encrypts Victim Data (threatpost.com)

EliSowash writes: "An unusual new strain of ransomware of ransomware makes good on its threat, doing what the majority of other varieties only claim to do. The Trojan actually encrypts data on infected machines, effectively rendering certain files inaccessible to users on compromised computers in order to block removal.

The Trojan displays a warning, that some illegal content has been found on their computer but, researcher Hynek Blinka has witnessed the Trojan encrypting images, documents and executables in an attempt to hinder any removal attempts."


Submission + - Android Malware increased nearly 600% in Q3 (zdnet.com)

EliSowash writes: "Trend Micro has released their third quarter roundup report, and the attention-grabbing statistic seems to be the sudden leap in mobile malware.

Specifically, Trend Micro said that malware targeting Android increased nearly sixfold in Q3 2012 to approximately 175,000 malicious and "potentially dangerous" high-risk Android apps between July and September. The bulk of that was found to be adware, which Trend Micro lamented that people think of adware as typically "non-threatening."

A fine line exists between collecting data for simple advertising use and violating one's privacy. Because adware normally collect user information for legitimate purposes, they can serve as an effective means to gather more data than some would want to give out."

Comment Re:Okay, I have to ask (Score 1) 11

Bow ties are cool. Explain any cult following, really. Dr. Wholigans are just a bunch of like-minded weirdos who have a penchant for time traveling aliens with two hearts and funny blue boxes. It's not a great sci-fi series, the awful special effects are sort of an inside joke with the audience, but it's lovable in its own ways.

Submission + - New State-Sponsered Malware "Gauss" making the rounds (wired.com)

EliSowash writes: "A newly uncovered espionage tool, apparently designed by the same people behind the state-sponsored Flame malware that infiltrated machines in Iran, has been found infecting systems in other countries in the Middle East, according to Kaspersky researchers. Gauss is a nation state sponsored banking Trojan which carries a warhead of unknown designation. Besides stealing various kinds of data from infected Windows machines, it also includes an unknown, encrypted payload which is activated on certain specific system configurations. Just like Duqu was based on the “Tilded” platform on which Stuxnet was developed, Gauss is based on the “Flame” platform."

Submission + - 'Luckycat' Advanced Persistent Threat Campaign Building Android Malware (darkreading.com)

EliSowash writes: "The attackers behind the recent Luckycat APT-type attack campaign are in the process of developing malware aimed at the Android, a researcher with Trend Micro said in a presentation at Defcon last week. Luckycat, an attack campaign with ties to Chinese hackers that targets Indian and Japanese military research institutions and the Tibetan community, last year also began targeting Mac OS X users."

Slashdot Top Deals

"There is nothing new under the sun, but there are lots of old things we don't know yet." -Ambrose Bierce