Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×
Businesses

Submission + - Dice Holdings buys Slashdot and other Geeknet websites for $20M (yahoo.com) 3

Angostura writes: Dice Holdings Inc. said Tuesday that it acquired Geeknet Inc.'s online media business, including its Slashdot and SourceForge websites, for $20 million in cash.
The New York-based careers website company said the acquisition of the technology websites is part of its strategy of providing content and services geared toward technology professionals.

Cellphones

Submission + - Google Pulls 21 Android Apps with Trojan Rootkits (switched.com)

suraj.sun writes: Thanks to a tip-off by a redditor, and some investigation by Android Police ( http://www.androidpolice.com/2011/03/01/the-mother-of-all-android-malware-has-arrived-stolen-apps-released-to-the-market-that-root-your-phone-steal-your-data-and-open-backdoor/ ), Google has pulled 21 Android Market apps that were infected with a backdoor Trojan rootkit. If you downloaded any of the infected apps, they will be automatically deleted from your phone.

The attack vector was ingenious, and plays on the Android Market's biggest weakness: the almost complete absence of app moderation. The nefarious developer crafted 21 apps that share the name of legitimate apps (such as 'Chess'), and into each of them he inserted some Trojan code. The apps then quietly report your sensitive data back to a remote server, while you play with your free app.

Download Squad: http://downloadsquad.switched.com/2011/03/02/google-pulls-21-android-malware-apps-with-trojan-rootkit-over-50000-infected/

Android Police: http://www.androidpolice.com/2011/03/01/the-mother-of-all-android-malware-has-arrived-stolen-apps-released-to-the-market-that-root-your-phone-steal-your-data-and-open-backdoor/

Media

BBC Offers iPhone Version of iPlayer, Accessible to Linux Users Too 187

smallfries writes "After a long battle with Linux users in the UK, the BBC was forced into releasing a flash version of the iPlayer streaming service to fulfill their obligations to license-fee payers. After claiming that development of Linux and Mac versions of the iPlayer would take two years, Auntie Beeb has rushed to support the iPhone. iPhone users 'can be trusted' because their platform is locked down ... so the beeb opened a non-DRM hole in the iPlayer to support them. This was guarded by the extreme security of User Agent strings! Long story short, Linux and Mac users have made their own non-DRM, non-Microsoft platform from firebug and wget. UK users can now watch (and keep) their favorite BBC shows."
Privacy

WikiLeaks Case Reopened 25

JediLow brings news that the judge who signed the order to take down WikiLeaks.org is now reconsidering his actions. Judge Jeffrey White ordered a new hearing to be held on Friday morning to answer further questions about the case[PDF]. Meanwhile, WikiLeaks has responded harshly to the recent statement issued by the bank Julius Baer.
Privacy

Submission + - Surveillance out of control in GB (guardian.co.uk) 1

An anonymous reader writes: The machine is out of control. Personal surveillance in Britain is so extensive that no democratic oversight is remotely plausible. Some 800 organizations, including the police, the revenue, local and central government, demanded (and almost always got) 253,000 intrusions on citizen privacy in the last recorded year, 2006. This is way beyond that of any other country in the free world.
Software

Linux Kernel 2.6.24 Released 108

LinuxFan writes "Linus Torvalds has released the 2.6.24 Linux Kernel, noting that he and most of the other key Linux developers will be flying to a conference in Australia for the next week. As the whole team will be down under while the kernel is being tested by the masses, Linus added, "Let's hope it's a good one". What's new in the latest release includes an optimized CFQ scheduler, numerous new wireless drivers, tickless kernel support for the x86-64 and PPC architectures, and much more. Time to download and start compiling."
Biotech

Engineered Mosquitoes Could Wipe Out Dengue Fever 343

Christina Valencia points us to a Wired story about scientists who plan to use genetically modified mosquitoes to reduce the population of Dengue-carrying insects. The altered genes cause newly born mosquitoes to die before they are able to breed if they are not supplied with a crucial antibiotic. This is a more aggressive approach than the anti-Malaria work we discussed last year. From Wired: "Mosquitoes pass dengue fever to up to 100 million people each year, according to the Centers for Disease Control and Prevention. Up to 5 million die. If the scientists can replicate their results in real field conditions, their technology could kill half of the next generation of dengue mosquitoes, which scientists say would significantly reduce the spread of the disease. If all goes well the company envisions releasing the insects in Malaysia on a large scale in three years."
Security

Mystery Malware Affecting Linux/Apache Web Servers 437

lisah writes "Reports are beginning to surface that some Web servers running Linux and Apache are unwittingly infecting thousands of computers, exploiting vulnerabilities in QuickTime, Yahoo! Messenger, and Windows. One way to tell if your machine is infected is if you're unable to create a directory name beginning with a numeral. Since details are still sketchy, the best advice right now is to take proactive steps to secure your servers. 'We asked the Apache Software Foundation if it had any advice on how to detect the rootkit or cleanse a server when it's found. According to Mark Cox of the Apache security team, "Whilst details are thin as to how the attackers gained root access to the compromised servers, we currently have no evidence that this is due to an unfixed vulnerability in the Apache HTTP Server." We sent a similar query to Red Hat, the largest vendor of Linux, but all its security team could tell us was that "At this point in time we have not had access to any affected machines and therefore cannot give guidance on which tools would reliably detect the rootkit."'"
Science

Teen Takes On Donor's Immune System 231

Leibel writes "The Australian ABC News is reporting that a 15-year-old Australian liver transplant patient has defied modern medicine by taking on her donor's immune system. Demi-Lee Brennan had a liver transplant. Nine months later, doctors at Sydney's Westmead Children's Hospital were amazed to find the teenager's blood group had changed to the donor's blood type. They were even more surprised when they found the girl's immune system had almost totally been replaced by that of the donor, meaning she no longer had to take anti-rejection drugs. 'Dr. Michael Stormon says his team is now trying to identify how the phenomenon happened and whether it can be replicated. "That's probably easier said than done... I think it's a long shot," he said. "I think it's a unique system of events whereby this happened. "We postulate there's a number of different issues - the type of liver failure that she had, some of the drugs that we use early on to suppress the immune system and also that she suffered an infection with a virus called CMV, or cytomegalovirus, which can also suppress the immune system."'"
Portables

Submission + - TuxMobil Now Offers 7,000 Linux Guides for Laptops (tuxmobil.org)

wehe writes: "The TuxMobil project covers all aspects concerning Linux on laptops and notebooks. The number of free guides and how-to's has more than doubled in less than three years, and more than 7,000 links to Linux laptop and notebook installation and configuration guides are now listed at TuxMobil. TuxMobil recently announced the publication of 7,000 Linux installation and configuration guides for laptops and notebooks on its Web site. The number of free guides and how-to's available through TuxMobil has more than doubled in less than three years. In the Linux community, it's common tradition to help other members by publishing free guides on many different aspects of the open source operating system. These guides and how-to's are suitable for newbies as well as experts. Most of the guides are in English, but special TuxMobil sections are dedicated to other languages. TuxMobil indexes the guides by manufacturer and model as well as by processor type, display size and Linux distribution. Almost any laptop manufacturer (more than 220) is covered. All major Linux distributions (Redhat, Fedora, Gentoo, Debian, Novell/SuSE, Ubuntu, Mandriva, Knoppix) and many not-so-well-known distributions are present. Besides Linux, the site includes sections that cover other Unix derivatives like BSD, Minix and Solaris."
Microsoft

Microsoft Giving Away Vista Ultimate, With a Catch 495

Opinari writes "In case you haven't heard, Microsoft is giving away copies of Windows Vista Ultimate (32-bit or 64-bit DVD), Microsoft Office Ultimate 2007, Microsoft Money Plus Premium, Microsoft Student with Encarta Premium 2008, or Microsoft Streets and Trips 2008 — you can choose any one. The caveat is that you have to let them monitor your use of the program."
Security

Submission + - DNS attack ushers in new era of Phishing 2.0 (computerworld.com.au)

Bergkamp10 writes: Researchers at Google and the Georgia Institute of technology are studying a new virtually undetectable form of attack that exploits 'open recursive' DNS servers, which are used to tell computers how to find each other on the Internet by translating domain names like google.com into numerical Internet Protocol addresses. Some 17 million open-recursive DNS servers are on the Internet, and unlike other DNS servers they answer all DNS lookup requests from any computer on the net, making them the perfect target for would be hackers and attackers. Criminals are apparently using these servers in tandem with new attack techniques to develop a generation 2.0 of phishing. Here's how an attack would work. A victim would visit a Web site or open a malicious attachment that would exploit a bug in his computer's software. Attackers would then change just one file in the Windows registry settings, telling the PC to go to the criminal's server for all DNS information. If the initial exploit code was not stopped by antivirus software, the attack would give attackers virtually undetectable control over the computer. Once they'd changed the Windows settings, the criminals could take victims to the correct Web sites most of the time, but then suddenly redirect them to phishing sites whenever they wanted — during an online banking session, for example. Because the attack is happening at the DNS level, anti-phishing software would not flag the phoney sites.

Slashdot Top Deals

If you can't understand it, it is intuitively obvious.

Working...