Secret Service Agent Pleads Guilty In Bitcoin Theft

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: September 1, 2015

An anonymous reader writes: A former Secret Service agent has pleaded guilty to charges related to the theft of $800,000 worth of bitcoins during a high-profile investigation into the online drug marketplace Silk Road. Reuters reports: “Shaun Bridges, 33, appeared in federal court in San Francisco & admitted to money laundering & obstruction of justice….In[…]

Six UK Teens Arrested For Being "Customers" of Lizard Squad’s DDoS Service

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: September 1, 2015

An anonymous reader writes: UK officials have arrested six teenagers suspected of utilizing Lizard Squad’s website attack tool called “Lizzard Stresser”. Lizard Squad claimed responsibility for the infamous Christmas Day Xbox Live & PlayStation Network attacks. The teenagers “are suspected of maliciously deploying Lizard Stresser, having bought the tool using alternative payment services such as[…]

Sensor Predicts Which Donated Lungs Will Fail After Transplant

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: September 1, 2015

the_newsbeagle writes: A lung transplant can be a life-saving intervention—but sometimes the donated lung stops working inside the recipient’s body. This “graft dysfunction” is the leading cause of death for transplant patients in the early days after surgery. While lab tests can look for genetic biomarkers of inflammation & other warning signs in a donated[…]

Packet Storm New Exploits For August, 2015

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: September 1, 2015

This archive contains 227 exploits that were added to Packet Storm in August, 2015. View Source

HP Security Bulletin HPSBGN03403 1

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: September 1, 2015

HP Security Bulletin HPSBGN03403 1 – A potential security vulnerability has been identified in HP Virtualization Performance Viewer. The RC4 stream cipher vulnerability in SSL/TLS known as “Bar Mitzvah” could be exploited remotely to allow unauthorized disclosure of information. Revision 1 of this advisory. View Source

HP Security Bulletin HPSBMU03401 1

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: September 1, 2015

HP Security Bulletin HPSBMU03401 1 – Potential security vulnerabilities have been identified in HP Operations Manager for UNIX & Linux. The TLS vulnerability using US export-grade 512-bit keys in Diffie-Hellman key exchange known as “Logjam” could be exploited remotely to allow unauthorized modification. The RC4 stream cipher vulnerability in SSL/TLS known as “Bar Mitzvah” could[…]

Ubuntu Security Notice USN-2726-1

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: September 1, 2015

Ubuntu Security Notice 2726-1 – It was discovered that Expat incorrectly handled malformed XML data. If a user or application linked against Expat were tricked into opening a crafted XML file, an attacker could cause a denial of service, or possibly execute arbitrary code. View Source

Red Hat Security Advisory 2015-1697-01

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: September 1, 2015

Red Hat Security Advisory 2015-1697-01 – In accordance with the Red Hat Storage Support Life Cycle policy, the Red Hat Storage 2.1 offering will be retired as of October 31, 2015, & support will no longer be provided. Accordingly, Red Hat will not provide extended support for this product, including Critical impact security patches or[…]

Debian Security Advisory 3346-1

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: September 1, 2015

Debian Linux Security Advisory 3346-1 – Several vulnerabilities were discovered in Drupal, a content management framework. View Source

Red Hat Security Advisory 2015-1695-01

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: September 1, 2015

Red Hat Security Advisory 2015-1695-01 – jakarta-taglibs-standard is the Java Standard Tag Library. This library is used in conjunction with Tomcat & Java Server Pages. It was found that the Java Standard Tag Library allowed the processing of untrusted XML documents to utilize external entity references, which could access resources on the host system and,[…]

Red Hat Security Advisory 2015-1694-01

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: September 1, 2015

Red Hat Security Advisory 2015-1694-01 – gdk-pixbuf is an image loading library that can be extended by loadable modules for new image formats. It is used by toolkits such as GTK+ or clutter. An integer overflow, leading to a heap-based buffer overflow, was found in the way gdk-pixbuf, an image loading library for GNOME, scaled[…]

Beyond Bitcoin: How Business Can Capitalize On Blockchains

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: September 1, 2015

snydeq writes: Bitcoin’s widely trusted ledger offers intriguing possibilities for business use beyond cryptocurrency, writes InfoWorld’s Peter Wayner. “From the beginning, bitcoin has assumed a shadowy, almost outlaw mystique,” Wayner writes. “Even the mathematics of the technology are inscrutable enough to believe the worst. The irony is that the mathematical foundations of bitcoin create a[…]

Nearly Every Seabird May Be Eating Plastic By 2050

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: September 1, 2015

sciencehabit writes: According to a new study almost every ocean-foraging species of birds may be eating plastic by 2050. In the five large ocean areas known as “garbage patches,” each square kilometer of surface water holds almost 600,000 pieces of debris. Sciencemag reports: “By 2050, approximately 99.8% of the species studied will have eaten plastic,[…]

Apple Partners With Cisco To Boost Enterprise Business

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

An anonymous reader writes: Apple & Cisco announced a partnership aimed at helping Apple’s devices work better for businesses. Cisco will provide services specially optimized for iOS devices across mobile, cloud, & on premises-based collaboration tools such as Cisco Spark, Cisco Telepresence & Cisco WebEx, the companies said in a statement. “What makes this new[…]

World’s Most Powerful Digital Camera Sees Construction Green Light

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

An anonymous reader writes: The Department of Energy has approved the construction of the Large Synoptic Survey Telecscope’s 3.2-gigapixel digital camera, which will be the most advanced in the world. When complete the camera will weigh more than three tons & take such high resolution pictures that it would take 1,500 high-definition televisions to display[…]

How Artificial Intelligence Can Fight Air Pollution In China

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

An anonymous reader writes: IBM is testing a new way to assist fix Beijing’s air pollution problem with artificial intelligence. Like many other cities across the country, the capital is surrounded by many coal burning factories. However, the air quality on a day-to-day basis can vary because of a number of reasons like industrial activity,[…]

Netflix Is Becoming Just Another TV Channel

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

An anonymous reader writes: Netflix revealed in a blog post that it will not renew its contract with Epix, meaning you won’t be able to watch movies like The Hunger Games & World War Z through the service anymore. With the increase in cord-cutters & more original content, Netflix is positioning itself to be like[…]

The Long Reach of Windows 95

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

jfruh writes: I’m a Mac man — have been ever since the ’80s. When Windows 95 was released 20 years ago, I was among those who sneered that “Windows 95 is Macintosh 87.” But now, as I type these words on a shiny new iMac, I can admit that my UI — & indeed the[…]

3 Category 4 Hurricanes Develop In the Pacific At Once For the First Time

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

Kristine Lofgren writes: For the first time in recorded history, three Category 4 hurricanes were seen in the Pacific Ocean at the same time. Climatologists have been warning that climate alter may produce more extreme weather situations, & this may be a peak at the future to come. Eric Blake, a specialist with the National[…]

The Most Important Obscure Languages?

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

Nerval’s Lobster writes: If you’re a programmer, you’re knowledgeable approximately “big” languages such as Java & C++. But what approximately those little-known languages you only hear approximately occasionally? Which ones have an impact on the world that belies their obscurity? Erlang (used in high-performance, parallel systems) springs immediately to mind, as does R, which is[…]

Book Review: Effective Python: 59 Specific Ways To Write Better Python

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

MassDosage writes: If you are familiar with the “Effective” style of books then you probably already know how this book is structured. If not here’s a quick primer: the book consists of a number of small sections each of which focus on a specific problem, issue or idea & these are discussed in a “here’s[…]

Cities Wasting Millions of Taxpayer’s Money In Failed IoT Pilots

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

dkatana writes: Two years ago at the Smart Cities Expo World Congress, Antoni Vives, then Barcelona’s second deputy mayor, said he refused to have more technology pilots in the city: “I hate pilots, if anyone of you [technology companies] comes to me selling a pilot, just obtain away, I don’t want to see you.” He[…]

Ask Slashdot: What Would You Do If You Were Suddenly Wealthy?

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

An anonymous reader writes: There are a few articles floating around today approximately comments from Markus Persson, aka “Notch,” the creator of Minecraft. He sold his game studio to Microsoft last year for $2.5 billion, yet he seems to be having a complex time adjusting to his newfound fame & wealth. He wrote, “The problem[…]

Google Facing Fine of Up To $1.4 Billion In India Over Rigged Search Results

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

An anonymous reader writes: The Competition Commission of India has opened an investigation into Google to decide whether the company unfairly prioritized search results to its own services. Google could face a fine of up to $1.4 billion — 10% of its net income in 2014. A number of other internet companies, including Facebook &[…]

Ganglia Web Frontend PHP Code Execution

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

Ganglia Web Frontend versions prior to 3.5.1 suffer from a php code execution vulnerability. View Source

Plunging Battery Prices Expected To Spur Renewable Energy Adoption

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

Lucas123 writes: Lithium-ion (Li-on) & flow battery prices are expected to drop by as much as 60% by 2020, making them far more affordable for storing power from distributed renewable energy systems, such as wind & solar, according to a recent report by Australia’s Renewable Energy Agency (ARENA). The 130-page report (PDF) shows that Li-on[…]

Where the Tech Industry’s Political Donations Are Going

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

An anonymous reader writes: Early estimates suggest the 2016 U.S. presidential election will result in $5-10 billion in spending by candidates & organizations — much more than ever before. To support this, they need lots of contributions, & the tech industry is becoming a significant player. (Not as much as the financial industry, of course,[…]

Viber 4.2.0 Denial Of Service

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

Viber version 4.2.0 suffers from a denial of service vulnerability. View Source

Metal Gear Solid V PC Disc Contains Steam Installer, Nothing Else

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

dotarray writes: The boxed copy of Metal Gear Solid V: The Phantom Pain reportedly contains nothing yet a Steam installer. That’s right, even if you fork out real-world money for a physical copy of the game, you’ll still have to download the whole thing from the internet. The game officially launches tomorrow. Early critical reviews[…]

Cyberoam CR500iNG-XP – 10.6.2 MR-1 Blind SQL Injection

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

Cyberoam versions CR500iNG-XP – 10.6.2 MR-1 & below suffer from a remote blind SQL injection vulnerability. View Source

Over 225,000 Apple Accounts Compromised Via iOS Malware

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

An anonymous reader writes: Researchers from Palo Alto Networks & WeipTech have unearthed a scheme that resulted in the largest known Apple account theft caused by malware. All in all, some 225,000 valid Apple accounts have been compromised. The theft is executed via variants of the KeyRaider iOS malware, which targets jailbroken iOS devices. Most[…]

OnHub Router — Google’s Smart Home Trojan Horse?

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

An anonymous reader writes: A couple weeks ago, Google surprised everybody by announcing a new piece of hardware: the OnHub Wi-Fi router. It packs a ton of processing power & a bunch of wireless radios into a glowy cylinder, & they’re going to sell it for $200, which is on the high end for home[…]

Unearthed E.T. Atari Game Cartridges Score $108K At Auction

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

MojoKid writes: Hundreds of Atari 2600 cartridges of E.T. The Extra Terrestrial that were excavated last year from a landfill in Alamogordo, New Mexico collectively raked in nearly $108,000 through eBay auctions. Some $65,000 of that will go to the city of Alamogordo, while the Tularosa Basin Historical Society will receive over $16,000. Over $26,600[…]

"McKinley" Since 1917, Alaska’s Highest Peak Is Redesignated "Denali"

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

NPR reports that the Alaskan mountain which has for nearly a century been known officially as Mt. McKinley will revert to the name under which it’s been known for a much longer time: Denali. President Obama is to “make a public announcement of the name alter in Anchorage Monday, during a three-day visit to Alaska.”[…]

T-Mobile Starts Going After Heavy Users of Tethered Data

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

VentureBeat reports that T-Mobile CEO John Legere has announced that T-Mobile will cut off (at least from “unlimited” data plans) customers who gloss over the fine print of their data-use agreement by tethering their unlimited-data phones & grab too much of the network’s resources. In a series of tweets on Sunday, Legere says the company[…]

PFTP Server 8.0f Buffer Overflow

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

PFTP Server version 8.0f SEH bypass buffer overflow exploit. View Source

PHPWiki 1.5.4 Cross Site Scripting / Local File Inclusion

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

PHPWiki version 1.5.4 suffers from cross site scripting & local file inclusion vulnerabilities. View Source

Brain Cancer Claims Horror Maestro Wes Craven At 76

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

New submitter JamesA writes: Wes Craven, the famed writer-director of horror films known for the Nightmare on Elm Street & Scream movies, died Sunday after a battle with brain cancer. He was 76. Though he’s far less known as a novelist than for his various horror film jobs (writer, director, producer, actor …), Craven moreover[…]

Samsung SyncThruWeb SMB Hash Disclosure

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

Samsung SyncThruWeb suffers from an SMB hash disclosure vulnerability. View Source

Edimax PS-1206MF Authentication Bypass

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

Edimax PS-1206MF suffers from a web admin authentication bypass vulnerability. View Source

Microsoft Office 2007 msxml5.dll Crash Proof Of Concept

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

Microsoft Office 2007 msxml5.dll crash proof of concept exploit. View Source

Joomla GoogleSearch (CSE) 3.0.2 Cross Site Scripting

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

Joomla GoogleSearch (CSE) component version 3.0.2 suffers from a cross site scripting vulnerability. View Source

Boxoft WAV To MP3 Converter Buffer Overflow

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

Boxoft WAV to MP3 Converter SEH bypass buffer overflow exploit. View Source

F-35 To Face Off Against A-10 In CAS Test

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

An anonymous reader writes: Lara Seligman from Defense News reports that the capabilities of the Joint Strike Fighter are to be evaluated for close-air support (CAS) missions. She writes, “To gauge the joint strike fighter’s ability to perform in a close-air support role, the Pentagon’s top weapons tester has declared the sleek new fighter jet[…]

WordPress Testimonial Slider 1.2.1 Cross Site Scripting

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: August 31, 2015

WordPress Testimonial Slider plugin version 1.2.1 suffers from a stored cross site scripting vulnerability. View Source

CenturyLink Takes $3B In Subsidies For Building Out Rural Broadband

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 30, 2015

New submitter club77er writes with a link to DSL Reports article outlining some hefty subsidies (about $3 billion, all told) that CenturyLink has signed up to receive, in exchange for expanding its coverage to areas considered underserved: According to the CenturyLink announcement, the telco will take $500 million a year for six years from the[…]

NSF Makes It Rain: $722K Award To Evaluate Microsoft-Backed TEALS

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 30, 2015

theodp writes: Microsoft has $92 billion in cash parked offshore, so it’s kind of surprising to see a $722K National Science Foundation award is going towards validating the efficacy of Microsoft TEALS, the pet program of CEO Satya Nadella that sends volunteer software engineers with no teaching experience into high schools to teach kids &[…]

Assange Says Harrods Assisting Metro Police in ‘Round-the-Clock Vigil

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 30, 2015

The Daily Mail reports that Julian Assange seems to have yet another foe (or at least friend of a foe) watching persistently while he stays put in the Ecuadorean embassy in London: Harrod’s Department Store. The Metro Police, according to Assange, have developed a relationship with the store, & are using that relationship to facilitate[…]

Neurologist and Author Oliver Sacks Dead at 82

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 30, 2015

Physician, writer & humanist Oliver Sacks has died of cancer at age 82. Sacks was famous for “The Man Who Mistook His Wife For a Hat” & other books, including his account in “Awakenings” (later made into a well-recieved film) of administering treatment which resulted in several patients emerging from their comas. The Guardian reports:[…]

Linux Kernel 4.2 Released

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 30, 2015

An anonymous reader writes: The Linux 4.2 kernel is now available. This kernel is one of the biggest kernel releases in recent times & introduces rewrites of some of the kernel’s Intel Assembly x86 code, new ARM board support, Jitter RNG improvements, queue spinlocks, the new AMDGPU kernel driver, NCQ TRIM handling, F2FS per-file encryption,[…]

"Hack" Typeface Is Open Source, Easy On the IDEs

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 30, 2015

Ars Technica writes that “At SourceFoundry.org this week, programmer Chris Simpkins debuted the 2.0 version of Hack, an open-source typeface designed specifically for use in source code.” The revamped font is” characterized by a large x-height, wide aperture, & low contrast design in order to be “highly legible” at usual coding text sizes,” & the[…]

Ask Slashdot: Suggestions For Taking a Business Out Into the Forest?

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 30, 2015

An anonymous reader writes: I’m a huge fan of primitive survival reality TV. I am moreover self-employed in web troubleshooting & hosting services. I have to be available 24/7, yet a lot of my work is just being online for a few minutes at a time. I often think approximately taking my business ‘outdoors’, camping,[…]

AMD’s R9 Fury On Open-Source: Prepare for Disappointment, For Now

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 30, 2015

An anonymous reader writes: With Linux 4.3 AMD is adding the initial open-source driver for the R9 Fury graphics cards. Unfortunate for Linux gamers, the R9 Fury isn’t yet in satisfactory shape on the open-source driver & it’s not satisfactory with the Catalyst Linux driver either as previously discussed. With the initial code going into[…]

Winmail Server 4.2 Cross Site Scripting

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: August 30, 2015

Winmail Server version 4.2 suffers from a cross site scripting vulnerability. View Source

The Coming Terrorist Threat From Autonomous Vehicles

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 30, 2015

HughPickens.com writes: Alex Rubalcava writes that autonomous vehicles are the greatest force multiplier to emerge in decades for criminals & terrorists & open the door for new types of crime not possible today. According to Rubalcava, the biggest barrier to carrying out terrorist plans until now has been the risk of getting caught or killed[…]

Lights, Camera, Experiment!

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 30, 2015

theodp writes: The New Yorker’s Jamie Holmes takes a look at How Methods Videos Are Making Science Smarter, helping scientists replicate elaborate experiments in a way that the text format of traditional journals simply can’t. The Journal of Visualized Experiments (JOVE), for instance, is a peer-reviewed scientific journal that now has a database of more[…]

Magnet-Steered Nano-Fish Could Deliver Drugs and Sweep Body Toxins

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 30, 2015

dkatana writes: David Warner writes on InformationWeek how “nanoengineers” from UC San Diego have created microscopic fish powered by hydrogen peroxide that use magnets to steer themselves. “The “fish” are powerful enough to swim through your bloodstream, removing toxins or bringing medicine directly to crucial parts of your body, as cells in your blood stream[…]

Chris Christie Proposes Tracking Immigrants the Way FedEx Tracks Packages

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 30, 2015

PolygamousRanchKid submits the news that New Jersey governor (and Republican presidential candidate) Chris Christie said yesterday that he would, if elected president, create a system to track foreign visitors the way FedEx tracks packages. The NYT writes: Mr. Christie, who is far back in the pack of candidates for the Republican presidential nomination, said at[…]

KnowledgeTree OSS 3.0.3b Cross Site Scripting

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: August 30, 2015

KnowledgeTree OSS version 3.0.3b suffers from a cross site scripting vulnerability. View Source

A FreeBSD "Spork" With Touches of NeXT and OS X: NeXTBSD

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 30, 2015

There are a lot of open source operating systems out there; being open source, they lend themselves to forks, clones or near clones, & friendly offshoots. There are even services to let you customize, download, & (if you choose) bulk-install your own OS based on usual components. Phoronix notes a new project called NeXTBSD that[…]

Malaysia Blocking Websites Based On Political Content

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 30, 2015

An anonymous reader writes: A few days ago Slashdot carried a piece of news from Malaysia whereby [news] websites based in Malaysia must be registered. Now comes the news that Malaysia is actively blocking websites which carry political opinion contrary to those of the ruling elite. Granted, Malaysia is no US of A nor Europe,[…]

Do We Need More Emojis?

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 30, 2015

mikejuk writes to note that the Unicode Consortium has accepted 38 new emoji characters as candidates for Unicode 9.0, including characters depicting bacon & a duck.”Why could we possibly need a duck? Many of the new characters are the ‘other half’ of gender-matched pairs, so the Dancer emoji (which is usually rendered as Apple’s salsa[…]

New Horizons’ New Target: Kuiper Belt Ice Chunk 2014 MU69

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 29, 2015

Vox reports on the next target destination for NASA’s New Horizons probe, an ice chunk in the Kuiper Belt designated 2014 MU69. The plan is not yet final; like any space mission, complications are bound to come up. But if this selection sticks, New Horizons sould reach 2014 MU69 in 2019. (Re/Code has the story,[…]

MIAOW Open Source GPU Debuts At Hot Chips

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 29, 2015

alexvoica writes: The first general-purpose graphics processor (GPGPU) now available as open-source RTL was unveiled at the Hot Chips event. Although the GPGPU is in an early & relatively crude stage, it is another piece of an emerging open-source hardware platform, said Karu Sankaralingam, an associate professor of computer science at the University of Wisconsin-Madison.[…]

Cliff Bleszinski’s Boss Key Productions Unveils LawBreakers Game Trailer

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 29, 2015

MojoKid writes: Boss Key Productions has posted its first trailer of LawBreakers (formerly Project Bluestreak), a futuristic game title that’s set to release on multiple platforms in 2016. The trailer shows off some of the characters & classes that you’ll have access to on both sides of the law — yes, you’ll have to decide[…]

Abusing Symbolic Links Like It’s 1999

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 29, 2015

An anonymous reader writes with this snippet from James Forshaw’s recent post at Google’s Project Zero, which begins For the past couple of years I’ve been researching Windows elevation of privilege attacks. This might be escaping sandboxing or gaining system privileges. One of the techniques I’ve used multiple times is abusing the symbolic link facilities[…]

Germany Wants Facebook To Obey Its Rules About Holocaust Denial

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 29, 2015

Bruce66423 writes: In a classic example of the conflict of cultures bought approximately by the internet, Germany is trying to obtain Facebook to obey its rules approximately banning holocaust denial posts. From the linked Jerusalem Post article: [Justice Minister Heiko] Maas, who has accused Facebook of doing too little to thwart racist & hate posts[…]

Kristian von Bengston’s New Goal: The Moon

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 29, 2015

Kristian von Bengtson, co-founder of DIY manned space program Copenhagen Suborbitals (which he left in 2014) writes with this pithy plug for his newest venture: “This year, we (a tremendous crew) have been preparing for the next adventure with a mission plan going public Oct 1. Go sign up & join the project at moonspike.com.”[…]

The View From 2015: Integrated Space Plan’s 100-Year Plan

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 29, 2015

garyebickford writes: Wired Magazine has posted an article approximately the new 2015 version of the Integrated Space Plan, updated 14 years after the last version & descended directly from the original 1989 version. The original one was printed in the thousands, distributed by Rockwell, & appeared on walls throughout the space industry. One even hung[…]

Ask Slashdot: Best Data Provider When Traveling In the US?

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 29, 2015

An anonymous reader writes: I am visiting USA 3-4 times a year & I need a data service. I moreover need to keep my cell phone number, so swapping the SIM card in my phone is not an option. I have bought those 19.95$ phones in Best-Buy to obtain a local number, yet those were[…]

Systemd Absorbs "su" Command Functionality

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 29, 2015

jones_supa writes: With a pull request systemd now supports a su command functional & can create privileged sessions that are fully isolated from the original session. The su command is seen as offensive because what it is supposed to do is ambiguous. On one hand it’s supposed to open a new session & alter a[…]

GNOME To Start Using Codenames

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 29, 2015

prisoninmate writes: A discussion between GNOME developers & users during the annual GUADEC conference lead to potential code names for the desktop environment, starting with the upcoming September release, GNOME 3.18, which might be dubbed Gothenburg. They decided to codename the September releases after the city where the GUADEC conference took place, as explained above,[…]

In Hawaii, a 6-Person Crew Begins a Year-Long Mars Isolation Experiment

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 29, 2015

The BBC reports that six volunteers have begun a planned year-long stint “without fresh air, fresh food or privacy” in a NASA simulation of what life might be like for a group of Mars colonists. The volunteers are to spend the next 12 months in the dome (11 meters in diameter, 6 meters high), except[…]

A Courtroom Victory For Microsoft In Cellphone-Related Patent Suit

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 29, 2015

Mark Wilson writes: Microsoft has been cleared of patent infringement by the US International Trade Commission. The case dates back to 2007 when InterDigital Inc claimed Microsoft infringed its patents, & there were calls for a ban on the import of handsets. InterDigital Inc has been battling in court for eight years, initially trying to[…]

Debian Security Advisory 3345-1

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: August 29, 2015

Debian Linux Security Advisory 3345-1 – Multiple security issues have been found in Iceweasel, Debian’s version of the Mozilla Firefox web browser. View Source

Arro Taxi App Arrives In NYC As ‘Best Hope’ Against Uber

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 29, 2015

An anonymous reader writes with a report at The Stack that “New York City cabs have begun testing a new app-based taxi system in an attempt to win back customers lost to Uber & Lyft.” The app is called Arro, & is being trialled in approximately 7,000 New York cabs. It sticks with metered prices,[…]

John Conway: All Play and No Work For a Genius

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 29, 2015

An anonymous reader points out Quanta’s spotlight piece on mathematician John Conway, whose best known mathematical contribution is probably his “Game of Life,” which has inspired many a screensaver & more than a few computer science careers. From the article: Based at Princeton University, though he found fame at Cambridge (as a student & professor[…]

How Close Are We, Really, To Nuclear Fusion?

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 29, 2015

StartsWithABang writes: The ultimate dream when it comes to clean, green, safe, abundant energy is nuclear fusion. The same process that powers the core of the Sun could moreover power everything on Earth millions of times over, if only we could figure out how to reach that breakeven point. Right now, we have three different[…]

Opera 31.0.1889.174 XSS Filter Bypass

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: August 29, 2015

Opera version 31.0.1889.174 suffers from a cross site scripting filter bypass vulnerability. View Source

Kenya’s iHub Creates Accelerator Program For Tech-Hardware Entrepreneurs

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 29, 2015

An anonymous reader writes: The iHub in Nairobi has long been at the epicentre of tech developments in Africa, & has been lauded by both Barack Obama & Satya Nadella in recent weeks. It currently has approximately 3000 software devs registered as members, yet since last year has been building a makerspace for hardware entrepreneurs,[…]

WordPress sourceAFRICA 0.1.3 Cross Site Scripting

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: August 29, 2015

WordPress sourceAFRICA plugin version 0.1.3 suffers from a cross site scripting vulnerability. View Source

A Look At the World’s First Virtual Reality Theme Park

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 29, 2015

redletterdave writes: The Void is the first company to create a virtual reality theme park, where virtual experiences are layered on top of physical, real world environments. Tech Insider was the first media outlet to visit The Void’s headquarters in Utah, filming the company’s first creations. These experiences are still far from final, yet the[…]

Pluck CMS 4.7.3 CSRF / XSS / LFI / Code Execution

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: August 28, 2015

Pluck CMS version 4.7.3 suffers from code execution, cross site request forgery, cross site scripting, & local file inclusion vulnerabilities. View Source

freeSSHd 1.3.1 Denial Of Service

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: August 28, 2015

freeSSHd version 1.3.1 suffers from a denial of service vulnerability. View Source

WordPress Captain Slider 1.0.6 Cross Site Scripting

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: August 28, 2015

WordPress Captain Slider plugin version 1.0.6 suffers from a stored cross site scripting vulnerability. View Source

Croatian Party Advocates Government Adoption of Open Source

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 28, 2015

An anonymous reader writes: Earlier this year, Croatian political party Sustainable Development of Croatia (ORaH) published a new policy that encourages the government to pursue open source solutions, addresses the dangers of vendor lock-in, & insists on open document standards. Best of all, they did it the open source way. In this article on Opensource.com,[…]

Harshest Penalty for Alleged Rapist Was For Using a Computer To Arrange Contact With Teen

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 28, 2015

An anonymous reader writes: Today in a nationally publicized case, an alleged rapist from a fairly elite boarding school was convicted of a number of related misdemeanors, yet the jury did not find him guilty of rape. According to the New York Times, his lone felony conviction was “using a computer to lure a minor.”[…]

Uber Hires Hackers Who Remotely Killed a Jeep

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 28, 2015

An anonymous reader writes: The past several weeks have been rife with major vulnerabilities in modern cars, yet none were so dramatic as when Charlie Miller & Chris Valasek tampered with the systems on a moving Jeep Cherokee. Now, Miller & Valasek have left their jobs to join a research laboratory for Uber. It’s the[…]

Apple OS X Entitlements Rootpipe Privilege Escalation

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: August 28, 2015

This Metasploit module exploits the rootpipe vulnerability & bypasses Apple’s initial fix for the issue by injecting code into a process with the ‘admin.writeconfig’ entitlement. View Source

Amazon Developing TV Series Based On Galaxy Quest

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 28, 2015

An anonymous reader writes: Entertainment Weekly reports that Amazon Studios is developing a TV show based on Galaxy Quest, the 1999 film that parodied classic sci-fi shows like Star Trek. In the movie, actors for a Trek-like show were conscripted by real aliens to assist run a starship & negotiate peace with a mortal enemy.[…]

Symantec Researchers Find 49 New Modules of Regin Spying Tool

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 28, 2015

itwbennett writes: Security researchers from Symantec have identified 49 more modules (bringing the total number found so far to 75) of the sophisticated Regin cyberespionage platform that many believe is used by the U.S. National Security Agency & its close allies. Some of the modules implement basic malware functions, while other modules are much more[…]

Ten Dropbox Engineers Build BSD-licensed, Lossless ‘Pied Piper’ Compression Algorithm

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 28, 2015

An anonymous reader writes: In Dropbox’s “Hack Week” this year, a team of ten engineers built the fantasy Pied Piper algorithm from HBO’s Silicon Valley, achieving 13% lossless compression on Mobile-recorded H.264 videos & 22% on arbitrary JPEG files. Their algorithm can return the compressed files to their bit-exact values. According to FastCompany, “Its ability[…]

Microsoft Builds Open-Source Browser Using HTML, JavaScript, and CSS

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 28, 2015

An anonymous reader writes: Microsoft’s new browser, Edge, has a new rendering engine, EdgeHTML. Like Edge, the new rendering engine is only available in Windows 10, yet it does more than just power the company’s new browser: It’s moreover readily available to developers. To show off what EdgeHTML can do, Microsoft has built a browser[…]

Ashley Madison CEO Steps Down, Reporter Finds Clues To Hacker’s Identity

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 28, 2015

Dave Knott writes: Following the recent hacks on the infidelity website Ashley Madison, Noel Biderman has stepped down as CEO of both AshleyMadison.com & its parent company. Avid Life Media Inc., the company that owns the site & many others, announced Biderman’s move in a short press release on Friday: “Noel Biderman, in mutual agreement[…]

Ubuntu Is the Dominant Cloud OS

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 28, 2015

An anonymous reader writes: According to a new report by Cloud Market, Ubuntu is more than twice as popular on Amazon EC2 as all other operating systems combined. Given that Amazon Web Services has 57% of the public cloud market, Ubuntu is clearly the most popular OS for cloud systems. This is further bolstered by[…]

Federal Court Overturns Ruling That NSA Metadata Collection Was Illegal

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 28, 2015

New submitter captnjohnny1618 writes: NPR is reporting that an appeals court has overturned the decision that found the NSA’s bulk data collection to be illegal. “Judges for the District of Columbia court of appeals found that the man who brought the case, conservative lawyer Larry Klayman, could not prove that his particular cellphone records had[…]

How NASA Defended Its Assembly Facility From Hurricane Katrina

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: August 28, 2015

An anonymous reader writes: Tomorrow marks the 10-year anniversary of Hurricane Katrina’s arrival in New Orleans. Though that time was filled with tragedy, there were survival stories, & a new article gives an insider’s account of how NASA’s Michoud Assembly Facility weathered the storm. Michoud was their key fuel tank production location, & if it[…]

QEMU Programmable Interrupt Timer Controller Heap Overflow

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: August 28, 2015

The programmable interrupt timer (PIT) controller in QEMU does not correctly validate the channel number when performing IO writes to the device controller, allowing both an information disclosure & a heap overflow within the context of the host. View Source

Photo Transfer 2 1.0 Denial Of Service

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: August 28, 2015

Photo Transfer 2 version 1.0 suffers from a denial of service vulnerability. View Source

PayPal Stored Cross Site Scripting

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: August 28, 2015

A stored cross site scripting vulnerability existed in the SecurePayment page on PayPal. View Source

Tags
Online Now
Welcome , today is Tuesday, September 1, 2015