Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Submission + - The Mysterious Malware that Jumps Airgaps

Hugh Pickens DOT Com writes: Dan Goodwin writes at Ars Technica about a rootkit that seems straight out of a science-fiction thriller. According to security consultant Dragos Ruiu one day his MacBook Air, on which he had just installed a fresh copy of OS X, spontaneously updated the firmware that helps it boot. Stranger still, when Ruiu then tried to boot the machine off a CD ROM, it refused and he also found that the machine could delete data and undo configuration changes with no prompting. Next a computer running the Open BSD operating system also began to modify its settings and delete its data without explanation or prompting and further investigation showed that multiple variants of Windows and Linux were also affected. But the story gets stranger still. Ruiu began observing encrypted data packets being sent to and from an infected laptop that had no obvious network connection with—but was in close proximity to—another badBIOS-infected computer. The packets were transmitted even when the laptop had its Wi-Fi and Bluetooth cards removed. Ruiu also disconnected the machine's power cord so it ran only on battery to rule out the possibility it was receiving signals over the electrical connection. Even then, forensic tools showed the packets continued to flow over the airgapped machine. Then, when Ruiu removed internal speaker and microphone connected to the airgapped machine, the packets suddenly stopped. With the speakers and mic intact, Ruiu said, the isolated computer seemed to be using the high-frequency connection to maintain the integrity of the badBIOS infection as he worked to dismantle software components the malware relied on. It's too early to say with confidence that what Ruiu has been observing is a USB-transmitted rootkit that can burrow into a computer's lowest levels and use it as a jumping off point to infect a variety of operating systems with malware that can't be detected. It's even harder to know for sure that infected systems are using high-frequency sounds to communicate with isolated machines. But after almost two weeks of online discussion, no one has been able to rule out these troubling scenarios, either. "It looks like the state of the art in intrusion stuff is a lot more advanced than we assumed it was," says Ruiu. "The take-away from this is a lot of our forensic procedures are weak when faced with challenges like this. A lot of companies have to take a lot more care when they use forensic data if they're faced with sophisticated attackers."

Submission + - FDA Will Regulate Some Apps As Medical Devices (securityledger.com)

chicksdaddy writes: In an important move, the U.S. Federal Drug Administration (FDA) has released final guidance to mobile application developers that are creating medical applications to run on devices like the iPhone and Android mobile devices. Some applications, it said, will be treated with the same scrutiny as traditional medical devices.

The statement is the final word from the FDA on the approach it will take when enforcing federal regulations regarding the safety of medical devices to the large and fast-growing category of medical applications. The agency said on Monday that, while it doesn’t see the need to vet “the majority of mobile apps,” because they pose “minimal risk to consumers,” it will exercise oversight of mobile medical applications that are accessories to regulated medical devices, or that transform a mobile device into a regulated medical device.

In those cases, the FDA said that mobile applications will be assessed “using the same regulatory standards and risk-based approach that the agency applies to other medical devices,” The Security Ledger reports.

The line between a mere "app" and a "medical device" is fuzzy. The FDA said it will look to the “intended use of a mobile app” when determining whether it meets the definition of a medical “device.” The Agency may study the labeling or advertising claims used to market it, or statements by the device maker and its representatives. In general, “when the intended use of a mobile app is for the diagnosis of disease or other conditions, or the cure, mitigation, treatment or prevention of disease, or it is intended to affect the structure of any function of the body of man, the mobile app is a device.”

Submission + - Made in Oakland: How one city turned into an art and maker mecca (techhive.com)

Kevin Lee writes: The maker scene is taking off in Oakland with towering industrial art, that at times stands 70 feet high, and DIY business that made locally created goods by hand. But while this is a flourishing creative environment is popping off with new ideas, there's a battle in Oakland that could pave over this rich community with new residential housing. The Oakland Makers is a new initiative by artists and makers that hopes revitalize Oakland as a new advanced manufacturing hub and city that thrives on the making culture.

Submission + - Rebuilding the internet (wired.com)

just_another_sean writes: Alex Polvi is living the great Silicon Valley archetype. Together with some old school friends, he’s piecing together a tech revolution from inside a two-car Palo Alto garage.
In a nutshell these guys are trying to use Linux to give the masses a cheap and reliable way to build server farms similar to Google or Amazon. It's an open source project called Core OS. Is "rebuilding the internet" on a single, standard server platform a good idea or is such an homogeneous environment an undesirable security problem waiting to be let loose?

Submission + - Physicists find solid-state 'triple point' in material that conducts, insulates (washington.edu) 1

vinces99 writes: It is well known to scientists that the three common phases of water – ice, liquid and vapor – can exist stably together only at a particular temperature and pressure, called the triple point. Also well known is that the solid form of many materials can have numerous phases, but it is difficult to pinpoint the temperature and pressure for the points at which three solid phases can coexist stably. Physicists now have made the first-ever accurate determination of a solid-state triple point in a substance called vanadium dioxide, which is known for switching rapidly – in as little as one 10-trillionth of a second – from an electrical insulator to a conductor, and thus could be useful in various technologies. "These solid-state triple points are fiendishly difficult to study, essentially because the different shapes of the solid phases makes it hard for them to match up happily at their interfaces," said David Cobden, a University of Washington physics professor who is lead author of a paper about the research published in Nature. "There are, in theory, many triple points hidden inside a solid, but they are very rarely probed."

Submission + - Possible proof of ABC conjecture (newscientist.com)

submeta writes: "Shinichi Mochizuki of Kyoto University has released a paper which claims to prove the decades-old ABC conjecture, which involves the relationship between prime numbers, addition, and multiplication. His solution involves thinking of numbers not as members of sets (the standard interpretation), but instead as objects which exist in 'new, conceptual universes'. As one would expect, the proof is extremely dense and difficult to understand, even for experts in the field, so it may take a while to verify. However, Mochizuki has a strong reputation, so this is likely to get attention. Proof of the conjecture could potentially lead to a revolution in number theory, including a greatly simplified proof of Fermat's Last Theorem."
News

Submission + - We Are Now One Year Away From Global Riots, Complex Systems Theorists Say (vice.com) 1

pigrabbitbear writes: "In a 2011 paper, researchers at the Complex Systems Institute unveiled a model that accurately explained why the waves of unrest that swept the world in 2008 and 2011 crashed when they did. The number one determinant was soaring food prices. Their model identified a precise threshold for global food prices that, if breached, would lead to worldwide unrest."
Politics

Submission + - Obama and Romney Respond to ScienceDebate.org Questionnaire (sciencedebate.org) 2

rhsanborn writes: President Barack Obama and Republican Presidential Nominee Mitt Romney have both responded to a questionnaire on the "most important science policy questions facing the United States". The questionnaire was created by ScienceDebate.org, a group consisting of many influential organizations in science and engineering. Questions are on many topics including research, internet regulation, and climate change.
Debian

Submission + - AMD64 Now Debian's Most Popular Architecture (thepowerbase.com)

An anonymous reader writes: Bill Allombert announced today via the Debian-devel mailing list that the X86_64 version of Debian has now surpassed all of the other supported architectures by a narrow margin. The most surprising part of this announcement however, and accompanying info-graphics provided on the Debian Popularity Contest page, is that this was not already true.

Thanks to PAE support is Debian kernels dating back to 2010, the i386 architecture had been given life support, finally allowing for systems to break through the 32-bit 4GB memory ceiling. PAE support allows for 64-bit Intel and AMD processors to dedicate the maximum addressable memory to individual applications, while still executing 32-bit code exclusively.

Submission + - UK Authorities Threaten to Storm Ecuadorian Embassy to Arrest Julian Assange (bbc.co.uk)

paulmac84 writes: "According to the BBC, the UK have issued a threat to storm the Ecuadorian Embassy to arrest Julian Assange. Under the terms of the Diplomatic and Consular Premises Act 1987 the UK has the right to revoke the diplomatic immunity of any embassy on UK soil. Ecuador are due to announce their decision on Assange's asylum request on Thursday morning."

Submission + - Demonoid Domain Names Up for Grabs (paritynews.com)

hypnosec writes: One of the most famous Torrent tracking sites Demonoid that was shut recently by Ukrainian authorities is at the receiving end of one more blow as the domain names for the site are up for grabs. As it stands, three Demonoid domains: Demonoid.me, Demonoid.com and Demonoid.ph are up for sale on Sedo. The time is ripe as of now for the sale of the domain names as it has caught the attention of many on and off the web. The traffic that Demonoid used to attract was huge and internet marketers would definitely want to bank on this. Initially thought of as being under a series of DDoS attacks the torrent tracking site was out for a prolonged duration following which it started serving malware laden ads.
Privacy

Submission + - White House Pulls Down TSA Petition (epic.org)

Jeremiah Cornelius writes: The Electronic Privacy Information Center posted a brief and detailed notice about the removal of a petition regarding security screenings by the TSA at US airports and other locations.

At approximately 11:30 am EDT, the White House removed a petition about the TSA airport screening procedures from the White House "We the People" website. About 22,500 of the 25,000 signatures necessary for a response from the Administration were obtained when the White House unexpectedly cut short the time period for the petition. The site also went down for "maintenance" following an article in Wired that sought support for the campaign.


Windows

Submission + - You can't bypass the UI formerly known as Metro on Windows 8 (networkworld.com) 1

colinneagle writes: The final build of Windows 8 has already leaked to torrent sites, which is giving the propellerheads a chance to dig through the code. One revelation will probably not sit well with enterprise customers: you can't bypass the don't-call-it-Metro UI.

Normally, you have to boot Windows 8 and when the tiled desktop UI (formerly known as Metro) came up, you had to click on one of the boxes to launch Explorer. Prior builds of Windows 8 allowed the user to create a shortcut so you bypass Metro and go straight to the Explorer desktop.

Rafael Rivera, co-author of the forthcoming Windows 8 Secrets, confirmed to Mary Jo Foley at ZDNet that Microsoft does indeed block the boot bypass routine from prior builds.

He also believes that Microsoft has blocked the ability for administrators to use Group Policy to allow users to bypass the tiled startup screen. There had been hope that Microsoft would at least relent and let corporate users have a bypass, if only for compatibility’s sake.

Google

Submission + - Google Starts Punishing Pirate Sites In Search Results (theverge.com)

An anonymous reader writes: Google constantly tweaks how its search engine delivers results to people, but it's rolling out a major new change next week: it'll start generally downranking sites that receive a high volume of copyright infringement notices from copyright holders. Google says the move is designed to "help users find legitimate, quality sources of content more easily" — meaning that it's trying to direct people who search for movies, TV shows, and music to sites like Hulu and Spotify, not torrent sites or data lockers like the infamous MegaUpload. It's a clear concession to the movie and music industries, who have long complained that Google facilitates piracy — and Google needs to curry favor with media companies as it tries to build an ecosystem around Google Play. Google says it feels confident making the change because because its existing copyright infringement reporting system generates a massive amount of data about which sites are most frequently reported — the company received and processed over 4.3 million URL removal requests in the past 30 days alone, more than all of 2009 combined. Importantly, Google says the search tweaks will not remove sites from search results entirely, just rank them lower in listings.
Patents

Submission + - Judge overturns patent suit, rules RIM did not infringe (ottawacitizen.com)

ottdmk writes: You may recall this recent Slashdot story about Mformation being awarded 147.2 million dollars in a patent suit agains RIM. Well, it appears a California appeals judge has disagreed with that verdict. As part of the ruling if Mformation successfully appeals, the matter will go to a new trial instead of the jury award being restored.

Slashdot Top Deals

"Floggings will continue until morale improves." -- anonymous flyer being distributed at Exxon USA

Working...