al0ha writes: I've noticed many people have a habit of getting in their car, starting the engine, then sit and use their PDA for many minutes, sometimes 10 or more, while the car is idling. They do this when there is absolutely no reason whatsoever to do so and I for one would like to see people crease this wasteful practice. It's bad for your wallet, it's bad for the environment.
How bad you ask? Visit the link and find out, up to 12 million gallons of fuel are wasted idling every day according to their statistic, and they are not even counting the people idling while txting etc.
Concerned with global warming? Turn off your freakin' car when there is no reason for it to be running.
al0ha writes: Schneier briefs members of Congress on the NSA in a closed door meeting. According to Bruce, "Surreal part of setting up this meeting: I suggested that we hold this meeting in a SCIF, because they wanted me to talk about top secret documents that had not been made public. So we had to have the meeting in a regular room."
I am so very happy to hear a rational expert, that is almost uniquely able to explain complex subjects and their potential ramifications to those of us possessing less than brilliant minds in this world, has been briefing Congress on the NSA.
al0ha writes: The first new passive circuit element since the 1830s might transform computer hardware.
In a thriving transistor monoculture where more transistors are created than grains of rice grown world wide; can a new circuit element find a place to take root and grow? That’s the question posed by the memristor, a device first discussed theoretically 40 years ago and finally implemented in hardware in 2008. The name is a contraction of “memory resistor,” which offers a good clue to how it works.
al0ha writes: Why is it that Slashdot session management is insecure? If you force HTTPS during login, then session cookies are set for encrypted sessions only, so for the rest of the site you are not logged in. If you login over insecure HTTP, then the session cookies are set for any connection.
This is totally lame and makes session hijacking via FireSheep simple, as well as credential sniffing on the wire and wireless.
How Geeky can Geeknet be if they can't even handle session management appropriately?
The password change page and login pages should be protected by HTTPS. Then session cookies appropriate for general content, or privileged content (like changing account information) should be set where privileged content always runs over HTTPS.
al0ha writes: A team of security researchers has created a proof-of-concept Trojan for Android handsets that is capable of listening out for credit card numbers — typed or spoken — and relaying them back to the application's creator.
al0ha writes: To paraphrase the article: "These days, the main enemy of privacy is not Big Brother, but a whole bunch of Little Brothers. I grant you that long experience teaches us that the government itself must be watched. However, if you think that it is the main threat to your privacy these days, I humbly suggest that you think again."
al0ha writes: In this week's issue of the journal Nature, a research team led by scientists at the California Institute of Technology (Caltech) has taken an important step toward understanding just how this kickoff occurs by beginning to dissect the neural circuitry of fear. In their paper, these scientists—led by David J. Anderson, the Benzer Professor of Biology at Caltech and a Howard Hughes Medical Institute investigator—describe a microcircuit in the amygdala that controls, or "gates," the outflow of fear from that region of the brain.
Read the Paper if you have No Fear; of real science.:-)
al0ha writes: From American Scientist: "Although data show that taking college-level science courses dramatically improves public science literacy, only about 30 percent of U.S. adults have ever taken even one college-level science course."
al0ha writes: The attack begins as it usually does — the Trojan steals the username and password as it is inserted by the user. Then, a rogue form pops up and demands of him to share his mobile phone vendor, model and phone number:
al0ha writes: Among many others I also found myself very skeptical that this self-proclaimed, "Whiz Kid" could code a truly useful and secure application in a few days.. Seems it turns out to be just another example of over-hype by the media regarding a product they themselves never saw. How pathetic.
al0ha writes: TWO small signals detected in an experiment deep underground in an abandoned US iron ore mine could be the first glimpses of the mysterious dark matter that is thought to make up about 24 per cent of the universe.
al0ha writes: Invincea, a security firm originally funded by the Defense Advanced Research Projects Agency (DARPA) to build a prototype virtualized browser, today rolled out a Windows application that places Internet Explorer (IE) into a virtual environment in order to protect the underlying system from Web-based attacks.
While the product is an interesting idea and may be useful, I totally object to the pricing as an American taxpayer. I have already helped pay for the development of this product; the CEO must be related to Bush/Cheney somehow. What a scam.
al0ha writes: From the article, "A paper published today by Chris Soghoian and Sid Stamm [pdf] suggests that the threat may be far more practical than previously thought. They found turnkey surveillance products, marketed and sold to law enforcement and intelligence agencies in the US and foreign countries, designed to collect encrypted SSL traffic based on forged 'look-alike' certificates obtained from cooperative certificate authorities."