Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Not really surprising, and not users' fault (Score 4, Informative) 81

As a security consultant, I've run phishing campaigns for quite a few clients, usually as part of a pen test where we'd use any captured credentials as a foothold for further testing. Typically, I expect about a 1-5% of recipients to click on the link and enter their credentials, with a convincing email and website combination.

Ten years ago, I might have placed most of the blame on users, for not observing obvious warning signs in the email and after clicking on the link, but these days I put the majority of the blame on the engineers and developers building the legitimate systems that those employees use.

10-20 years ago, one could be pretty sure that any credentials for a given company (let's call them "TransferLicious") would be entered somewhere in the website whose name was the one domain associated with that company ("transferlicious.com"). Over time, devs and engineers embraced vanity/novelty domains for a variety of purposes, and now the same company might legitimately have login forms on "transferlici.os", "xfrlcs.io", "transferliciousbanking.com", and so on. Those URLs might be further masked by link-shortening services.

How many enterprise/social-media single-sign-on services involve redirections to other domains? Now the problem is multiplied, because their employer uses "BlueSkies SSO", and their devs and engineers do the same thing. Am I getting sent to a login page from "blueski.es" now instead of "online.blueskies.com" because it's a phishing attack, or because a BlueSkies dev thought it would be "sick" to use a vanity domain instead?

Browser vendors have made hiding technical information from users a priority, and a huge number of users are on mobile devices that don't support things like hovering the cursor over links anyway, so there's another "how to spot a malicious link" technique down the drain.

Users shouldn't have to care about details like that in the first place, but the people building the systems and browsers have done such a terrible job that there aren't even any consistent rules that users can keep in mind. This makes it easy for me to phish people during pen tests, which is great, but it's sad from just about every other perspective.

Submission + - Autobraking tech will be standard in cars by 2022 (cbsnews.com)

pgmrdlm writes: Autobraking tech will be standard in cars by 2022, but drivers complain of "phantom braking"
Automatic emergency braking will be standard in most cars in 2022. The technology is expected to cut the number of rear-end crashes in half, but hundreds of drivers say sometimes the system slams on the brakes – apparently for no reason. CBS News found reports of several accidents and injuries that drivers blamed on false activations of emergency automatic braking systems. Safety advocates and carmakers say in the vast majority of cases it works, but it is not perfect.

For Cindy Walsh, getting behind the wheel of her 2018 Nissan Rogue raises her anxiety level. Since she bought the SUV new last October, she told CBS News correspondent Kris Van Cleave it has slammed on the brakes three times for no clear reason when she said there was no risk of a collision.

"The first one, I was driving down a four-lane highway going about 55 and it completely came to a complete stop," Walsh said. Now she said she's scared to drive the car, so she doesn't drive it.

Walsh took it to the dealer each time. Twice, she said, they told her they fixed it.

The National Highway Traffic Safety Administration (NHTSA) is now investigating the 2017 and 2018 Rogue after learning of nearly 850 complaints of false activation of the SUV's automatic braking system. That includes reports of 14 crashes and five injuries.

China

Scientists Are Making Human-Monkey Hybrids in China (technologyreview.com) 210

glowend shares a report: In a controversial first, a team of researchers have been creating embryos that are part human and part monkey, reports the Spanish daily El Pais. According to the newspaper, the Spanish-born biologist Juan Carlos Izpisua Belmonte, who operates a lab at the Salk Institute in California, has been working with monkey researchers in China to perform the disturbing research. Their objective is to create "human-animal chimeras," in this case monkey embryos to which human cells are added. The idea behind the research is to fashion animals that possess organs, like a kidney or liver, made up entirely of human cells. Such animals could be used as sources of organs for transplantation. The technique for making chimeras involves injecting human embryonic stem cells into a days-old embryo of another species. The hope is that the human cells will grow along with the embryo, adding to it. Izpisua Belmonte tried making human-animal chimeras previously by adding human cells to pig embryos, but the human cells didn't take hold effectively. Because monkeys are genetically closer to humans, it's possible that the new experiments could now succeed. To give the human cells a better chance of taking hold, scientists also use gene-editing technology to disable the formation of certain types of cells in the animal embryos.
AI

The Police in UK Want AI To Stop Violent Crime Before it Happens (newscientist.com) 170

Police in the UK want to predict serious violent crime using artificial intelligence, New Scientist is reporting. The idea is that individuals flagged by the system will be offered interventions, such as counseling, to avert potential criminal behavior. From the report: However, one of the world's leading data science institutes has expressed serious concerns about the project after seeing a redacted version of the proposals. The system, called the National Data Analytics Solution (NDAS), uses a combination of AI and statistics to try to assess the risk of someone committing or becoming a victim of gun or knife crime, as well as the likelihood of someone falling victim to modern slavery. West Midlands Police is leading the project and has until the end of March 2019 to produce a prototype. Eight other police forces, including London's Metropolitan Police and Greater Manchester Police, are also involved. NDAS is being designed so that every police force in the UK could eventually use it. Police funding has been cut significantly over recent years, so forces need a system that can look at all individuals already known to officers, with the aim of prioritizing those who need interventions most urgently, says Iain Donnelly, the police lead on the project.

Comment Re:We're becoming more and more idiots (Score 2) 92

If malicious content isn't written to disk[1], it's much less likely to be picked up by AV/antimalware components, because most of those hook into file read/write operations within the OS for their real-time protection. Additionally, this technique can sometimes be used to bypass application-whitelisting tools, if it's a tool already on the whitelist which is injecting the malicious code into process memory. That's why it's treated as something special/"magic".

Post-exploitation tools that avoid writing malicious code to disk are inherently different from more basic tools which *do* write the code to disk. If not "fileless", how would you suggest referring to them?

[1] Doesn't matter if it's magnetic media, SSD, RAM disk, etc., but it needs to be something the OS considers a "disk", not just a random place in memory.

Comment I have a soft spot for the novel (Score 1) 589

I first read _Starship Troopers_ when I was maybe 10 years old. I liked the story, but the further into it I got, the more I couldn't shake a sense of unease about the whole thing. By the time I'd finished, I realized why: whether Heinlein intended it this way or not, it reads like a sci-fi action-adventure written in a parallel universe where fascism is the norm. i.e. it generally assumes that a fascist society is basically "the way things are", as opposed to commenting on whether or not it's the right way.[1]

As an adult, I find this kind of thing very valuable, because it's a great way to get inside the heads of people who truly believe in points of view that I disagree with. I'm very much *not* a fascist, but without having read Heinlein's novel, I wouldn't understand the allure of it for people who *are*.

I hated the film when it was released, because it obviously had little to do with the novel. In retrospect, I feel like Verhoeven was trying to make a film that had a similar effect on viewers to what the novel had on me, but he focused too much on the "your heroes are fascists" aspect, as opposed to the "understanding why fascism is attractive to a lot of people" aspect. i.e. he wanted the viewer to draw a very specific conclusion - that fascism is wrong. I agree with that conclusion, but I think the story is more thought-provoking if the viewer/reader is left to make their own decision about it after being transported to a world where it's normal.

[1] a few parts, like the classroom lecture on armed force, are obvious exceptions.

Comment Re:Just Looked at My PIN (Score 3, Interesting) 176

There's nothing intrinsically wrong with using a timestamp

Yes, there is, when the topic involves security (which is almost always). Unlike a well-vetted PRNG, truncating a timestamp (at either end) has no mathematical basis for producing high-entropy results.

Just about every modern programming language has a built-in mechanism for generating random numbers with high entropy. There is no reason to not use that functionality in a case like this.

Comment Re:About time! (Score 2) 266

The small percentage of the population which falls outside size norms want to pass laws requiring that they be given enough space at the same price as everyone else.

I'm well within "normal" size - 5'10", 150-160 pounds depending on the season and what kind of exercise I've been doing. I wear a jacket with 36" shoulders, and my trousers have a 31" waist.

Most of the major US airlines have seats that just barely fit me. I have flown on one (can't remember which offhand) where my hip bone was pressing into the padding on both sides of the seat simultaneously. If my hips had been any wider, I would literally have not fit in the seat.

This isn't about edge-cases. This is about airlines trying to provide accommodations that are inadequate for something like half of the population.

Comment Re:And so it begins... (Score 1) 407

You don't think it's possible that one of the manufacturers used a software/firmware-enforced lockout instead of a physical mechanism? That's basically what the designers of the THERAC-25 did.

What about a lockout mechanism that was physically weak enough for the robot to break through?

IMO, the lockout mechanism for heavy machinery should physically cut the power to the entire system, but I'm not a mechanical engineer, and there may be reasons where that's not possible.

Comment Re:Juvenile psychosis only (Score 1) 249

Absolutely, and I'm very concerned that the results will be misinterpreted as a result.

I've known a number of people with schizophrenia and other psychoses, and most of them didn't develop full symptoms until their mid-20s or later. I believe this is also why the condition is not selected against as one might expect - it's very possible for someone to have children before going over the edge. Perhaps if it's caused by exposure to toxoplasma gondii, we're actually selecting for mutations of it that don't cause symptoms until after the average age of procreation :\.

I'm not an unbiased observer, because I've seen really promising people destroyed psychologically by psychoses, but I consider the way the results were framed *extremely* irresponsible due to the age cutoff.

Comment Re:Stupid (Score 2) 1042

I agree that it's silly to spend a *lot* of time thinking about this topic. However, I think most of the discussion here is missing some obvious scenarios:

1 - We exist entirely within the simulation (the 'Holodeck Moriarty' scenario)

a - It may still be possible to escape. If I have code running in RAM on my PC, and I turn off my PC, yes, that code stops running. But if instead I migrate it to a mobile device, it can continue to run even if the PC is turned off. IIRC, Virtualization software can do this sort of thing literally with an actively running system, and the OS running in that system will not "notice" that it has been migrated.

a1 - There may be some sort of VMWare Tools-/Holodeck Arch-esque interface within the simulation which provides access to the simulator or the world in which it exists.

a2 - There may be flaws in the simulator which allow the equivalent of a stack buffer overflow exploit.

b - The entire goal of the simulation could be to use evolutionary algorithm-style processes to create entities with the capability and desire to escape the simulation.

b1 - Our reality could be a simulation created by entities who believe *they* are living in a simulation, and want to develop the capability to escape from it but don't know how (the 'Meta-Musk' scenario).

b2 - Our reality could be a mostly-benign test environment intended to determine if there are flaws in the security controls of a complex simulation system which will eventually be used as a sort of sandbox for something potentially really dangerous.

2 - We have physical form of some sort outside the simulation, and are simply wired into the simulator.

a - If those physical forms are fully-functioning bodies, then escaping is potentially just a matter of disconnecting (the 'Matrix' scenario).

b - If those physical forms are the equivalent of a brain in a jar, then escaping would also require transferring that into fully-functioning bodies, which would require some sort of ability to interact with devices in the "real world", or cooperation from someone in that world, but it would still be theoretically possible.

3 - Regardless of the type of simulation, it may not be actively monitored. It seems *unlikely* that entities advanced enough to simulate our reality would leave out automated protective measures, but I don't think it's *impossible*.

a - Maybe our universe is running on the equivalent of an old Pentium Pro rack server that someone forgot about in a corner of the datacenter.

b - Maybe after setting the simulation in motion, a catastrophe wiped out the entities which created it, but not their machines.

4 - To go in a completely different direction, we (the human race) still don't have a full understanding of what consciousness is. If we did, then logically we could build something with artificial consciousness from scratch, or understand with certainty why doing so was not possible. Until we do have that level of understanding, then it remains possible (however remote) that there is something metaphysical about consciousness*.

a - If there is, and it is not actually possible to create artificial consciousness, then a lot of the "reality as simulation" scenarios are pruned away, because all of the remaining scenarios require at least one "brain in a jar"/Keanu Reeves in a Giger pod (if not billions/trillions). It may even fundamentally change the probability of whether or not we're living in a simulation.

* I am not overly-fond of most variations on that scenario, because I prefer to believe that there are no barriers other than time and effort to developing a complete understanding of our universe, but I don't think it makes sense to discount it as a possibility until we actually understand how to make an artificial self-aware entity.

I'm sure there are many others that I'm not considering. It's an interesting philosophical exercise, if nothing else. I personally don't think it's worth expending actual research time on unless some compelling evidence is discovered to support it first.

Comment Re:What would you do if malware tried to break out (Score 1) 1042

If you look at the behind-the-scenes production design material for _Tron Legacy_, the "direct digitization of matter into information" laser from the first film was retconned into a system where basically the positions of each molecule were mapped, magic happens resulting in the conscious personality being transported into the computer world, and the raw matter that makes up their body is disassembled and stored in tanks attached to the device so that their body can be recreated in the physical world when they want to leave.

It doesn't explain everything, but the production crew did think about the problem you mention. Quora (sp?) is given a physical body using matter that was in those tanks.

Censorship

The New Censorship: 'How Did Google Become The Internet's Censor and Master Manipulator?' (usnews.com) 246

An anonymous reader writes: Robert Epstein from U.S. News and World Report writes an article describing how Google has become the internet's censor and master manipulator. He writes about the company's nine different blacklists that impact our lives: autocomplete blacklist, Google Maps blacklist, YouTube blacklist, Google account blacklist, Google News blacklist, Google AdWords blacklist, Google AdSense blacklist, search engine blacklist, and quarantine list. The autocomplete blacklist filters out select phrases like profanities and other controversial terms like "torrent," "bisexual" and "penis." It can also be used to protect or discredit political candidates. For example, at the moment autocomplete shows you "Ted" (for former GOP presidential candidate Ted Cruz) when you type "lying," but it will not show you "Hillary" when you type "crooked." While Google Maps photographs your home for everyone to see, Google maintains a list of properties it either blacks out or blurs out in its images depending on the property, e.g. military installations or wealthy residences. Epstein makes the case that while YouTube allows users to flag videos, Google employees seem far more apt to ban politically conservative videos than liberal ones. As for the Google account blacklist, you may lose access to a number of Google's products, which are all bundled into one account as of a couple of years ago, if you violate Google's terms of service agreement because Google reserves the right to "stop providing Services to you ... at any time." Google is the largest news aggregator in the world via Google News. Epstein writes, "Selective blacklisting of news sources is a powerful way of promoting a political, religious or moral agenda, with no one the wiser." Google can easily put a business out of business if a Google executive decides your business or industry doesn't meet its moral standards and revokes a business' access to Google AdWords, which makes up 70 percent of Google's $80 billion in annual revenue. Recently, Google blacklisted an entire industry -- companies providing high-interest "payday" loans. If your website has been approved by AdWords, Google's search engine is what ultimately determines the success of your business as its algorithms can be tweaked and search rankings can be manipulated, which may ruin businesses. Epstein makes an interesting case for how Google has become the internet's censor and master manipulator. Given Google's online dominance, do you think Google should be regulated like a public utility?
Earth

Volcano Erupts In Southwest Alaska, Sending Ash 20,000 Feet (google.com) 76

USA Today reports that according to the U.S. Geological Survey, the Pavlov Volcano, "about 600 miles southwest of Anchorage, erupted at 4:18 p.m. local time. The agency says the eruption also led to tremors on the ground. ... The USGS has raised the volcano alert level to "Warning" and the aviation warning to 'Red.'" Television station KTUU of Anchorage has a few photos of the emerging ash plume, which has so far risen to about 20,000 feet (hence that aviation warning).
Earth

We Had All Better Hope These Scientists Are Wrong About the Planet's Future (washingtonpost.com) 618

Less than 24 hours since we read this dire climate study, an anonymous reader writes from a Washington Post report about several more concerning things: James Hansen, a former NASA scientist, says his new study suggests the impact of global warming will be quicker and more catastrophic than generally envisioned. The research invokes collapsing ice sheets, violent megastorms and even the hurling of boulders by giant waves in its quest to suggest that even 2 degrees Celsius of global warming above pre-industrial levels would be far too much. Hansen has called it the most important work he has ever done. "I think almost everybody who is really familiar with both paleo and modern is now very concerned that we are approaching, if we have not passed, the points at which we have locked in really big changes for young people and future generations," Hansen said.

Slashdot Top Deals

You have mail.

Working...