Forgot your password?
typodupeerror
China

Backdoor Found In China-Made US Military Chip? 270

Hugh Pickens writes "Information Age reports that the Cambridge University researchers have discovered that a microprocessor used by the US military but made in China contains secret remote access capability, a secret 'backdoor' that means it can be shut off or reprogrammed without the user knowing. The 'bug' is in the actual chip itself, rather than the firmware installed on the devices that use it. This means there is no way to fix it than to replace the chip altogether. 'The discovery of a backdoor in a military grade chip raises some serious questions about hardware assurance in the semiconductor industry,' writes Cambridge University researcher Sergei Skorobogatov. 'It also raises some searching questions about the integrity of manufacturers making claims about [the] security of their products without independent testing.' The unnamed chip, which the researchers claim is widely used in military and industrial applications, is 'wide open to intellectual property theft, fraud and reverse engineering of the design to allow the introduction of a backdoor or Trojan', Does this mean that the Chinese have control of our military information infrastructure asks Rupert Goodwins? 'No: it means that one particular chip has an undocumented feature. An unfortunate feature, to be sure, to find in a secure system — but secret ways in have been built into security systems for as long as such systems have existed.'" Even though this story has been blowing-up on Twitter, there are a few caveats. The backdoor doesn't seem to have been confirmed by anyone else, Skorobogatov is a little short on details, and he is trying to sell the scanning technology used to uncover the vulnerability.
Slashdot.org

Video Introducing SlashBI 339

By now you’ve noticed that Slashdot is growing. We recently introduced Slashdot TV, which offers up everything from “amateur” rocket launches to the return of Leisure Suit Larry. We revamped our newsletters. Now we’re launching some new sites devoted to very specific corners of tech. Our first one, SlashBI, focuses on the fast-changing world of business intelligence, and features articles and opinion pieces on everything from how Big Data and analytics could make salespeople extinct, to B.I. apps for your iOS device, to choosing the right database for a business. No matter what your background, chances are good you’ll find something of interest here. Swing on over, give it a look-see, and let us know what you think.
Education

Forget an Essay; Earn a Scholarship With a Tweet 99

PolygamousRanchKid writes with this quote from a CNN article: "The Kentucky Fried Chicken Foundation is asking eligible high school seniors to tweet a photo that illustrates their commitment to education and enriching their communities. The KFC Colonel's Scholars winner, announced December 15, will receive up to $5,000 per year to pursue a bachelor's degree at a public university in his or her home state. ... Other organizations, perhaps weary of wading through applicants' lengthy essays, also are offering eager students ways to turn a 140-character message into money for college. ... Why a tweet? Jodi Schafer, the University of Iowa's director of MBA admissions and financial aid, told USA Today that application essays were 'becoming unoriginal.' She said 'we're hoping that incorporating social media in the process will help bring back some of that creativity.'"
Software

Secure Syslog Replacement Proposed 248

LinuxScribe writes with this bit from IT World: "In an effort to foil crackers' attempts to cover their tracks by altering text-based syslogs, and improve the syslog process as a whole, developers Lennart Poettering and Kay Sievers are proposing a new tool called The Journal. Using key/value pairs in a binary format, The Journal is already stirring up a lot of objections." Log entries are "cryptographically hashed along with the hash of the previous entry in the file" resulting in a verifiable chain of entries. This is being done as an extension to systemd (git branch). The design doesn't just make logging more secure, but introduces a number of overdue improvements to the logging process. It's even compatible with the standard syslog interface allowing it to either coexist with or replace the usual syslog daemon with minimal disruption.
Privacy

UK Government Pushing For 'Trusted Computing' 291

Motor writes "As has long been expected — we are now beginning to see governments pushing for the use of so-called 'trusted computing' — chips installed in all computers that effectively remove control of the PC from its owner. While there may be security advantages to some of the ideas, few can doubt that it represents a fundamental shift in the IT world. A radical move away from an open technology landscape and towards a system that denies all access unless you have the right credentials. Governments will demand the right credentials to access their services — meaning approved software stacks (i.e Windows) with the right digital signatures. Vernor Vinge had it right ."
EU

EU Debates Installing a Black Box On Your Computer 459

bs0d3 writes "EU MEP Tiziano Motti (Italy), wants everything you do online to be logged and saved, for the sake of the children. Like a black box installed on every computer. He proposes an early warning system of criminal activity, specifically whenever an image of sexually abused children is detected, an alarm, goes to the authorities to be able to see who uploaded it. Tiziano Motti was a politician who just over a year ago managed to get a majority of European Members of Parliament to support the proposal to expand the data storage directive to Google searches. The purpose was to protect children from pedophiles — the same excuse he is using now. His proposal involves a technology called Logbox. And just as with an aircraft's black box, Logbox is installed on computers, laptops, smartphones, and e-readers because yes, all that can be connected to the internet."
Bitcoin

Value of Bitcoin "Crashes" 709

souravzzz writes with an update on the state of Bitcoin. Quoting the Ars Technica article: "Bitcoin, the world's first peer-to-peer digital currency, fell below $3 on Monday. That represents a 90 percent fall since the currency hit its peak in early June." That's still three times its value in April 2011.
Apple

California Declares Today "Steve Jobs Day" 333

First time accepted submitter onezeta writes "California Gov. Jerry Brown, in an announcement via a Twitter post, has declared it 'Steve Jobs Day.' The Apple co-founder's life as a technology trailblazer will be marked Sunday by his company's home state at a private memorial service and in a television documentary airing tonight at 8 pm EST on Discovery."
Education

India Launches $35 Tablet 203

Many readers have submitted stories about a new $35 tablet computer released today in India. The Aakash (meaning sky) has been handed out to 500 students for an initial trial run, if successful a $60 commercial version will hit the shelves later this year. The Aakash computer runs Android 2.2 (Froyo), has a 7-inch touch screen, 256MB of RAM, 32GB expandable memory slot, two USB ports, and weighs in at only 350 grams.
NASA

Neal Stephenson On 'Innovation Starvation' 437

Geoffrey.landis writes "In an essay discussing the space program, author Neal Stephenson suggests that the decline of the space program 'might be symptomatic of a general failure of our society to get big things done.' He suggests that we may be suffering from innovation starvation: 'Innovation can't happen without accepting the risk that it might fail. The vast and radical innovations of the mid-20th century took place in a world that, in retrospect, looks insanely dangerous and unstable.'" Though the context is different, this reminds me of economist Tyler Cowen's premise that the U.S. has for decades been in a Great Stagnation.
Music

Court Reinstates $675k File Sharing Verdict 388

FunPika writes with this excerpt from Wired: "A federal appeals court on Friday reinstated a whopping $675,000 file sharing verdict that a jury levied against a Boston college student for making 30 tracks of music available on a peer-to-peer network. The decision by the 1st U.S. Circuit Court of Appeals reverses a federal judge who slashed the award as 'unconstitutionally excessive.' U.S. District Judge Nancy Gertner of Boston reduced the verdict to $67,500, or $2,250 for each of the 30 tracks defendant Joel Tenenbaum unlawfully downloaded and shared on Kazaa, a popular file sharing peer-to-peer service. The Recording Industry Association of America and Tenenbaum both appealed in what has been the nation's second RIAA file sharing case to ever reach a jury. The Obama administration argued in support of the original award, and said the judge went too far when addressing the constitutionality of the Copyright Act's damages provisions. The act allows damages of up to $150,000 a track." Update: 09/17 21:32 GMT by S : As it turns out, the article's explanation of the decision is a bit lacking; read on for NewYorkCountryLawyer's more accurate explanation.
Earth

The Coming Energy Turnaround In Germany 394

An anonymous reader writes "Germany has decided to close all of its nuclear power plants by 2022 and embark on an energy turnaround that focuses on large increases in sustainable energy production. What will it take in terms of investments, and will it mean cost hikes for German consumers? Will it really mean more jobs in the 'green energy' sector? Quoting: 'Total investment over the next decade for such an energy turnaround is estimated to be roughly €200 billion (or almost $290 billion). ... At the moment, more than 20 new coal-fired power plants are being planned or already under construction; together, they would achieve a total output of 10 gigawatts and could, in terms of power supply, replace nuclear power plants that are still operational. But coal-fired power plants do not fit into the concept of the sustainable energy turnaround that the government has put forward.'"
Google

Google Explores Re-Ranking Search Results Using +1 Button Data 126

tekgoblin writes "Google plans to use data from its +1 button to re-order search results and keep spammers at bay. While this would bring Google’s search engine into the social networking era, it would also create a new avenue for blackhats to manipulate search results. From the article: '"Google will study the clicks on +1 buttons as a signal that influences the ranking and appearance of websites in search results," a spokesman wrote. "The purpose of any ranking signal is to improve overall search quality. For +1's and other social ranking signals, as with any new ranking signal, we'll be starting carefully and learning how those signals are related to quality."'"

Slashdot Top Deals

Some people manage by the book, even though they don't know who wrote the book or even what book.

Working...