Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Submission + - RSA Broke Their Cypher for $10M - NIST Elliptic Curves Broken? 1

An anonymous reader writes: It appears the NSA paid RSA Corp. $10M dollars to switch their default RNG to Diffie-Hellman Elliptic Curves. http://www.reuters.com/article/2013/12/20/us-usa-security-rsa-idUSBRE9BJ1C220131220 After the Snowden revelations, RSA urged its customers to switch to a different algorithm.

If the NIST curves really are broken (as has been suggested for years http://www.wired.com/politics/security/commentary/securitymatters/2007/11/securitymatters_1115 ), then most SSL connections might be too, amirite? Happy holidays...

Submission + - NSA Spied Upon: 60 Countries, Unicef, EU Competition Commissioner & Israeli

mrspoonsi writes: BBC Reports: More details of people and institutions targeted by UK and US surveillance have been published by The Guardian, The New York Times and Der Spiegel. The papers say that the list of around 1,000 targets includes a European Union commissioner, humanitarian organisations and an Israeli PM. They suggest over 60 countries were targets of the NSA and Britain's GCHQ. GCHQ monitored the communications of foreign leaders — including African heads of state and sometimes their family members — and directors of United Nations and other relief programmes. The paper reports that the emails of Israeli officials were monitored, including one listed as "Israeli prime minister". The PM at the time, 2009, was Ehud Olmert. The Dutch Liberal MEP Sophia in 't Veld described the latest claims as "shocking". "The UK spying on its fellow EU member states in order to get an economic advantage is simply unacceptable"
Security

Submission + - Adobe Reader zero-day found, selling for $50k (scmagazine.com.au)

mask.of.sanity writes: A new exploit is being reportedly sold on underground cybercrime forums that is capable of compromising machines running the latest versions of Adobe Reader.

The exploit escapes the sandbox in Windows-based Reader installs of versions X and IX. It was selling for as much as US$50,000 on a few small underground criminal websites.

It was already incorporated into a version of the hugely popular Blackhole exploit kit.

Concerned users can protect themselves by switching pdf readers.

Submission + - 7-inch display with 2.560 x 1.600 pixels Introduced (blogspot.de)

An anonymous reader writes: Currently there is a huge hype surrounding displays with ever higher resolution. In smartphones, it appears from 2013 to include the done thing when a FullHD display is installed. Here several smartphone manufacturers have released similar models or in the pipeline for 2013. And with the recently announced Nexus 10 tablet is still one went one step further and presented a display with a resolution of 2,560 x 1,600 pixels at 10 inches.
Programming

Submission + - ARM programming for dummies. 1

MouseTheLuckyDog writes: Sorry to go off topic, and get away from the serious discussions of things like the US Presidential Election that Slashdot is known for.

I'm interested in learning how to program ARM processors, as well as learning some of the evolution of ARM instruction set, register structure, interrupt structure etc.

So can anyone give any suggestions about the best way to approach to take?
AT&T

Submission + - AT&T To Pay $700,000 For Overcharging Consumers (cnet.com)

An anonymous reader writes: CNet reports on an agreement between AT&T and the FCC which will require the telecom company to pay $700,000 to the federal government. AT&T will also refund charges to customers who were switched from pay-as-you-go data plans to monthly plans after AT&T said they could keep the old plans. 'AT&T has also agreed to an extensive compliance plan (PDF), which includes: consumer notification, training of customer care representatives, and periodic compliance reports to the FCC. AT&T must also conduct additional searches of its records to identify improperly switched consumers and ensure appropriate refunds.'
Security

Submission + - Heinrich Kieber's Public Testimony (theglobeandmail.com)

Anonymous Whistleblower Lover writes: In the centre of the unraveling Tax Haven saga, where big names in business such as Westfield Holdings are now being named, stands a single man, Heinrich Kieber an IT consultant for the LGT-Treuhand Bank of Lichtenstein, which has since been revealed as "place for money with the stains that won't come out". Now H. Kieber is has made his first public address at a US senate committee hearing:

"It was then when I began to realize the very questionable business the LGT was often involved in and the dubious clients they were serving, the kind of business that goes beyond just facilitating massive tax evasion,"

Going through thousands of documents, I got very — I got the very clear picture of the highly sophisticated and sometimes surprisingly simple tricks and methods used. ..."

The articles go on to describe some of the methods the banks used to protect their clients, including training bankers in implementing encryption and obscuring their identities.

Upgrades

Submission + - Portuguese scientists invent the paper transistor (publico.clix.pt)

whopub writes: Making a regular transistor requires high temperatures, raw materials and hight-tech production methods. Now portuguese scientists at Lisbon's Universidade Nova found a way to build them with paper, at room temperature, for a fraction of the cost. When transistors were first instroduced in the 40s, replacing the much bigger valves, they allowed for electronic devices to become smaller, cheaper and (arguably) more dependable. Now, with this development, electronic gadgets can become not only even cheaper (due to low cost of the materials, and the simplified production processes) but actually disposable! Of course gadgets have become disposable a long time ago, since they now only outlast their warranties by a few seconds, so maybe companies can start marketing them for what they trully are.

Don't expect a $9.99 iPhone just yet though. The article mentions a few examples os possible applications, like medical sensors, price tags, smart packages and... paper displays.



The article is in portuguese, but can easily be translated online. Throughout the day some international media should pick up the story. I'll follow the discussion to try to help clearing up issues with the web translations...

Security

Submission + - Firefox 3 Obeys IE7's Download Security Settings (washingtonpost.com)

An anonymous reader writes: One of the odder behaviors of Firefox 3 is that it blocks file downloads if a Windows user has tweaked Internet Explorer 7's security options to the highest settings possible, the Washington Post's Security Fix Blog writes. The Post speculates this change is Mozilla's way of playing nicer with corporate networks that may rely heavily on IE. Mozilla offers users some workarounds (even registry tweaks) to change the default behavior of FF3. Meanwhile, Mozilla says that the new Firefox browser also will automatically scan downloaded files with any anti-virus installed on the user's machine, which it notes "may cause a substantial delay in saving the downloaded file."
Security

Submission + - Cracker Akill slapped with wet bus ticket

Gromit#35 writes: The NZ justice system has seen fit to discharge cracker Owen "Akill" Thor Walker without conviction and a nominal fine, at the same time praising him for his skillz. Justice Judith Potter said a conviction could jeopardise his prospects and potentially outstanding future. There has been some suggestion — that neither Walker nor the NZ Police has confirmed — that he may be offered work with NZ Police.
Software

Submission + - Shuttleworth Supporting Open Voting Consortium (openvotingconsortium.org)

Jordan Cronin writes: "OVC, who will be demoing their voting system at the Linux World conference, is working to raise $30,000 by August 4th, so that they will be able to complete and certify their voting solution in the state of California. Mark Shuttleworth, entrepreneur and founder of Canonical, has given his support to the OVC in their mission to provide an open, verifiable voting solution."
Security

Submission + - Open source software for lost or stolen laptops (washington.edu)

An anonymous reader writes: Adeona is the first Open Source system for tracking the location of your lost or stolen laptop that does not rely on a proprietary, central service. This means that you can install Adeona on your laptop and go — there's no need to rely on a single third party. What's more, Adeona addresses a critical privacy goal different from existing commercial offerings. It is privacy-preserving. This means that no one besides the owner (or an agent of the owner's choosing) can use Adeona to track a laptop. Unlike other systems, users of Adeona can rest assured that no one can abuse the system in order to track where they use their laptop.

Adeona is designed to use the Open Source OpenDHT distributed storage service to store location updates sent by a small software client installed on an owner's laptop. The client continually monitors the current location of the laptop, gathering information (such as IP addresses and local network topology) that can be used to identify its current location. The client then uses strong cryptographic mechanisms to not only encrypt the location data, but also ensure that the ciphertexts stored within OpenDHT are anonymous and unlinkable. At the same time, it is easy for an owner to retrieve location information.

Hardware Hacking

Submission + - iPhone 2.0 already broken (pcworld.com)

jcrousedotcom writes: "Apparently, according to the PC World article — the iPhone 2.0 didn't take as long to hack as the 1.0:

Well that was fast. The iPhone 3G has only been available for a matter of hours — not days — but Gizmodo's iPhone Dev Team is already claiming the new software upgrade is unlocked and working just fine. An unlocked or "jailbroken" iPhone has meant you don't need to be an AT&T Wireless customer to get wireless service with an iPhone. The iPhone hack also has allows jailbroken iPhones to run a host of third-party iPhone applications that have not been approved by Apple."

Slashdot Top Deals

Moneyliness is next to Godliness. -- Andries van Dam

Working...