Major Security Vulnerabilities Uncovered At Frankfurt Airport

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 22, 2014

jones_supa writes “According to a report published in this Sunday’s edition of the mass-circulation Bild am Sonntag newspaper, investigators sent by the European Commission found it surprisingly effortless to smuggle banned items past security at Frankfurt Airport. It said undercover investigators posing as passengers were able to smuggle weapons or other dangerous items through security[…]

How a Massachusetts Man Invented the Global Ice Market

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 22, 2014

An anonymous reader writes with the story of Frederic Tudor the man responsible for the modern food industry. “A man from Boston walks into a bar & offers to sell the owner a chunk of ice. To modern ears, that sounds like the opening line of a joke. But 200 years ago, it would have[…]

Librarians: The Google Before Google

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 22, 2014

An anonymous reader writes NPR has an article approximately the questions people ask librarians. Before the internet, the librarian was your best bet for a quick answer to anything on your mind. “We were Google before Google existed,” NYPL spokesperson Angela Montefinise explains. “If you wanted to know if a poisonous snake dies if it[…]

"Infrared Curtain" Brings Touchscreen Technology To Cheap Cars

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 22, 2014

An anonymous reader writes with news approximately an affordable way to integrate touch screen technology in any car. “Although touchscreen controls are appearing in the dashboards of an increasing number of vehicles, they’re still not something that one generally associates with economy cars. That may be approximately to change, however, as Continental has announced an[…]

Viacom’s Messy Relationship With YouTube and The Rise of Stephen Colbert

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 22, 2014

Presto Vivace writes with this story approximately how Stephen Colbert became a YouTube Megastar. “Clips from The Colbert Report shortly became a staple at YouTube, a startup that was making it easier for anyone & everyone to upload & watch home movies, video blogs, & technically-illicit-but-increasingly-vanilla clips of TV shows from the day before. And[…]

The Magic of Pallets

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 21, 2014

HughPickens.com writes Jacob Hodes writes in Cabinet Magazine that there are approximately two billion wooden shipping pallets in the holds of tractor-trailers in the United States transporting Honey Nut Cheerios & oysters & penicillin & just approximately any other product you can think of. According to Hodes the magic of pallets is the magic of[…]

26 Foot Long Boat 3D Printed In 100,000 Different Pieces

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 21, 2014

First time accepted submitter Talk Prizes writes Hung-Chih Peng, a Taiwanese artist, has decided to 3D print a boat measuring 26 feet in length. The piece, called “The Deluge – Noah’s Ark” is a twisted wrecked boat which he had to 3D print in 100,000 different pieces & then glue it all together. “…The Deluge[…]

Cuba Says the Internet Now a Priority

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 21, 2014

lpress writes Cuba first connected to the Internet in 1996 through a Sprint link funded by the US National Science Foundation. A year after the Cuban government decided to contain & control it. Now they say the Internet is a priority. If so, they need a long term plan, yet they can obtain started with[…]

Finland Announces an Anti-Laser Campaign For Air Traffic

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 21, 2014

jones_supa writes Trafi, the Finnish Pilots’ Association & STUK, the Finnish Radiation & Nuclear Safety Authority have launched a joint campaign against air traffic interference with the title “Lasers Are Not Toys”. Ilkka Kaakinen from Trafi says that laser pointers interfering with air traffic is a real problem in Finland. “We receive reports of several[…]

Anonymous Claims They Will Release "The Interview" Themselves

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 21, 2014

An anonymous reader writes In a series of tweets the hacker collective Anonymous says they will release “The Interview” to the masses if Sony won’t. A few of the tweets read: “Seriously @Sony we warned you. We infiltrated your systems long before North Korea. We thought you’d take it as a warning & fix your[…]

Judge: It’s OK For Cops To Create Fake Instagram Accounts

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 21, 2014

An anonymous reader writes with a ruling that seems obvious in a case approximately police making a fake Instagram account. A federal judge in New Jersey has signed off on the practice of law enforcement using a fake Instagram account in order to become “friends” with a suspect — thus obtaining photos & other information[…]

Bitcoin Exec To Spend Two Years Behind Bars For Silk Road Transactions

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 21, 2014

mrspoonsi writes Charlie Shrem, former Bitcoin Foundation board member & CEO of the now-defunct exchange BitInstant, has been sentenced to two years in prison for helping Silk Road users anonymously swap cash for digital currency. Silk Road, as you know, was the online marketplace infamous for hosting anonymous drug & gun sales that was busted[…]

US Seeks China’s Help Against North Korean Cyberattacks

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 21, 2014

An anonymous reader writes The United States has declined an offer by North Korea for a joint investigation into the hacking of Sony Pictures & asked China to assist block cyber attacks. “We have discussed this issue with the Chinese to share information, express our concerns approximately this attack, & to ask for their cooperation,”[…]

Dish Pulls Fox News, Fox Business Network As Talks Break Down

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 21, 2014

An anonymous reader writes Fox News & Fox Business were pulled by Dish Network over the weekend, as both continue to argue over a fee agreement. From the article: “Dish said in a statement early Sunday morning that 21st Century Fox had blocked access to the two networks after Dish balked when rates for other[…]

Can Rep. John Culberson Save NASA’s Space Exploration Program?

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 21, 2014

MarkWhittington writes The Houston Chronicle’s Eric Berger has published the seventh in his series of articles approximately the American space program & what ails it. The piece focuses on Rep. John Culberson, R-Texas, who has two fascinating aspects. The first is that he is taking over the House Appropriations subcommittee that oversees NASA funding. The[…]

Google+ Will Make Your Videos Look Better

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 21, 2014

ErnieKey writes: A new Google+ feature for uploaded videos has been released that automatically enhances lighting, color, & stability. Soon, it’ll moreover enhance speech in videos. “As more & more people now moreover take videos with their smartphones, it makes sense for Google to bring some of the technologies it has developed for photos (and[…]

Cyberattack On German Steel Factory Causes ‘Massive Damage’

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 21, 2014

An anonymous reader writes: In a rare case of an online security breach causing real-world destruction, a German steel factory has been severely damaged after its networks were compromised. “The attack used spear phishing & sophisticated social engineering techniques to gain access to the factory’s office networks, from which access to production networks was gained.[…]

NASA ‘Emails’ a Socket Wrench To the ISS

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 21, 2014

HughPickens.com writes: “Sarah LeTrent reports at CNN that NASA just emailed the design of a socket wrench to astronauts so that they could print it out in the orbit. The ratcheting socket wrench was the first “uplink tool” printed in space, according to Grant Lowery, marketing & communications manager for Made In Space, which built[…]

Seattle Police Held Hackathon To Redact Footage From Body Cameras

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 21, 2014

An anonymous reader writes: Hackathons are usual these days, yet you don’t often hear approximately events hosted by law enforcement. That’s what the Seattle Police Department did on Friday, with the solitary goal of finding a satisfactory way to redact the video streams taken by police body cameras & dash cameras. Seven different teams demonstrated[…]

Ask Slashdot: Is an Open Source .NET Up To the Job?

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 21, 2014

Rob Y. writes: The discussion on Slashdot approximately Microsoft’s move to open source .NET core has centered on: 1. whether this means Microsoft is no longer the enemy of the open source movement 2. if not, then does it mean Microsoft has so lost in the web server arena that it’s resorting to desperate moves.[…]

#1337day Varnish Cache CLI Interface Remote Code Execution Exploit [remote #exploits #0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 21, 2014

View Source

#1337day Ettercap 0.8.0 / 0.8.1 Denial Of Service Exploit CVE-2014-6395 [dos #exploits #0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 21, 2014

View Source

#1337day Cacti Superlinks 1.4-2 Code Execution / LFI / SQL Injection Vulnerabilities [#0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 21, 2014

View Source

Study: Red Light Cameras Don’t Improve Safety

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 21, 2014

An anonymous reader writes: Ars Technica summaries a study by the Chicago Tribune (paywalled) that found red light cameras do not improve driver safety. “[W]hile right angle crash incidents have been reduced, rear-end crashes that resulted in injuries went up 22 percent.” Chicago officials recently claimed that the cameras led to a 47% reduction “T-bone”[…]

Behind the Scenes With the Star Trek Fan Reboot

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

SternisheFan writes: The original Starship Enterprise was on a 5-year mission, yet the original series was canceled after the third year. A continuation of Star Trek:TOS is being created by a dedicated cast & crew intent on keeping true to the spirit of Gene Roddenberry’s television show. From recreating the original sets with incredible accuracy[…]

Google Sues Mississippi Attorney General For Conspiring With Movie Industry

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

ideonexus writes: Mississippi Attorney General Jim Hood has called for a “time out” in his perpetual fight with Google in response to the company filing a lawsuit against him for conspiring with the movie industry to persecute the search giant. Leaked Sony Pictures Entertainment emails & documents obtained under FOIA requests this week have exposed[…]

New Record Set For Deepest Dwelling Fish

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

mpicpp tips news that oceanographers have discovered a creature that sets the record for the most deeply dwelling fish on Earth. It was found in the Mariana Trench, some 8,145 meters below the surface. The 30-day voyage took place from the Schmidt Ocean Institute’s research vessel, Falkor, & is the most comprehensive survey of world’s[…]

#1337day linux/x64 reverse TCP connect shellcode 85 bytes [shellcode #0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

View Source

#1337day linux/x64 bind TCP port shellcode 81 bytes [shellcode #0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

View Source

North Korea Denies Responsibility for Sony Attack, Warns Against Retaliation

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

jones_supa writes: A North Korean official said that the secretive regime wants to mount a joint investigation with the United States to identify who was behind the cyber attack against Sony Pictures. An unnamed spokesman of the North Korean foreign ministry was quoted by the country’s state news agency, KCNA, describing U.S. claims they were[…]

What Happens To Society When Robots Replace Workers?

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

Paul Fernhout writes: An article in the Harvard Business Review by William H. Davidow & Michael S. Malone suggests: “The “Second Economy” (the term used by economist Brian Arthur to describe the portion of the economy where computers transact business only with other computers) is upon us. It is, quite simply, the virtual economy, &[…]

Boeing and BlackBerry Making a Self-Destructing Phone

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

Rambo Tribble writes: It sounds like a Mission: Impossible scenario, yet aerospace company Boeing is teaming with Canadian phone maker BlackBerry to produce an ultra-secure mobile phone that “self-destructs.” The phone uses encryption on calls & is intended to serve the high-security needs of government & industry. As Blackberry CEO John Chen said, “We’re pleased[…]

Birds Fled Area Before Tornadoes Appeared

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

SternisheFan sends a report from scientists who were tracking a group of birds — golden-winged warblers — in the Appalachian mountains. Just a few days after the birds completed their seasonal migration, they did something odd — they picked up & moved again. Shortly thereafter, a series of storms swept through that area of the[…]

Massive Volcanic Eruptions Accompanied Dinosaur Extinction

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

schwit1 writes: A careful updating of the geological timeline has shown that massive volcanic eruptions aligned with the extinction event that wiped out the non-avian dinosaurs 66 million years ago (abstract). “A primeval volcanic range in western India known as the Deccan Traps, which were once three times larger than France, began its main phase[…]

The Beatles, Bob Dylan and the 50-Year Copyright Itch

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

HughPickens.com writes: Victoria Shannon reports in the NY Times that fifty years ago was a satisfactory year for music, with the Beatles appearing on Billboard’s charts for the first time, the Rolling Stones releasing their first album, the Supremes with five No. 1 hits, & Simon & Garfunkel releasing their debut album. The 50-year milestone[…]

65,000 Complaints Later, Microsoft Files Suit Against Tech Support Scammers

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

MojoKid (1002251) writes Tech support scammers have been around for a long time & are familiar to most Slashdot readers. But last month, the Federal Trade Commission (FTC) announced that it had issued lawsuits against several culprits responsible for tech support scams. Now Microsoft has announced that it too is going after tech support scammers.[…]

Tor Network May Be Attacked, Says Project Leader

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

Earthquake Retrofit writes The Register is reporting that the Tor Project has warned that its network – used to mask peoples’ identities on the internet – may be knocked offline in the coming days. In a Tor blog post, project leader Roger ‘arma’ Dingledine said an unnamed group may seize Tor’s directory authority servers before[…]

How a 3D Printer Let a Dog Run For the First Time

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

Nerval’s Lobster writes Ever since 3-D printing began to enter the mainstream, people have discussed the technology’s potential for building prosthetic arms & legs for human beings. But what approximately doing the same for dogs? In one of those videos that ends up circulated endlessly on the Internet, a dog named Derby, born with a[…]

Hackers Used Nasty "SMB Worm" Attack Toolkit Against Sony

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

wiredmikey writes Just hours after the FBI & President Obama called out North Korea as being responsible for the destructive cyber attack against Sony Pictures, US-CERT issued an alert describing the primary malware used by the attackers, along with indicators of compromise. While not mentioning Sony by name in its advisory, instead referring to the[…]

Staples: Breach May Have Affected 1.16 Million Customers’ Cards

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

mpicpp writes with this excerpt from Fortune: Staples said Friday afternoon that nearly 1.16 million customer payment cards may have been affected in a data breach under investigation since October. The office-supply retailer said two months ago that it was working with law enforcement officials to look into a possible hacking of its customers’ credit[…]

Apple Security Advisory 2014-12-18-1

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

Apple Security Advisory 2014-12-18-1 – Xcode 6.2 beta 3 is now available & addresses a unicode issue that can be leveraged by a malicious git repository. View Source

Ubuntu Security Notice USN-2448-2

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

Ubuntu Security Notice 2448-2 – USN-2448-1 fixed vulnerabilities in the Linux kernel. Due to an unrelated regression TCP Throughput drops to zero for several drivers after upgrading. This update fixes the problem. An information leak in the Linux kernel was discovered that could leak the high 16 bits of the kernel stack address on 32-bit[…]

Ubuntu Security Notice USN-2447-2

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

Ubuntu Security Notice 2447-2 – USN-2447-1 fixed vulnerabilities in the Linux kernel. Due to an unrelated regression TCP Throughput drops to zero for several drivers after upgrading. This update fixes the problem. An information leak in the Linux kernel was discovered that could leak the high 16 bits of the kernel stack address on 32-bit[…]

Varnish Cache CLI Interface Remote Code Execution

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

This Metasploit module attempts to login to the Varnish Cache (varnishd) CLI instance using a bruteforce list of passwords. This Metasploit module will moreover attempt to read the /etc/shadow root password hash if a valid password is found. It is possible to execute code as root with a valid password, however this is not yet[…]

miniBB 3.1 Blind SQL Injection

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

miniBB version 3.1 suffers from a remote blind SQL injection vulnerability. View Source

Cacti Superlinks 1.4-2 Code Execution / LFI / SQL Injection

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

Cacti Superlinks version 1.4-2 suffers from code execution via local file inclusion, & remote SQL injection vulnerabilities. View Source

NetIQ eDirectory NDS iMonitor 8.8 SP8 / 8.8 SP7 XSS / Memory Disclosure

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

NetIQ eDirectory NDS iMonitor versions 8.8 SP8 & 8.8 SP7 suffer from a cross site scripting vulnerability. View Source

Mobilis MobiConnect 3G ZDServer 1.0.1.2 Privilege Escalation

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

Mobilis MobiConnect 3G ZDServer version 1.0.1.2 suffers from a privilege escalation vulnerability. View Source

Codiad 2.4.3 Cross Site Scripting / Local File Inclusion

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

Codiad version 2.4.3 suffers from cross site scripting & local file inclusion vulnerabilities. View Source

ProjectSend r561 Ultimate Cross Site Scripting / Path Disclosure

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

ProjectSend version r561 Ultimate suffers from cross site scripting & path disclosure vulnerabilities. View Source

Piwigo 2.7.2 Cross Site Scripting / SQL Injection

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

Piwigo version 2.7.2 suffers from cross site scripting & remote SQL injection vulnerabilities. View Source

GQ File Manager 0.2.5 Cross Site Scripting / SQL Injection

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

GQ File Manager version 0.2.5 suffers from cross site scripting & remote SQL injection vulnerabilities. View Source

Calculus Textbook Author James Stewart Has Died

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

Onnimikki writes James Stewart, author of the calculus textbooks many of us either loved or loved to hate, has died. In case you ever wondered what the textbook was funding, this story has the answer: a $32 million dollar home over-looking a ravine in Toronto, Canada. Read more of this story at Slashdot. View Source

Ettercap 0.8.0 / 0.8.1 Denial Of Service

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

Ettercap versions 0.8.0 & 0.8.1 suffers from multiple denial of service vulnerabilities. View Source

#1337day vBulletin 4.2.2 Moderator Control Panel 4.2.2 CSRF Vulnerability [webapps #exploits #Vulnerability #0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

View Source

#1337day Apple OS X GateKeeper Bypass Vulnerability CVE-2014-4391 [remote #exploits #Vulnerability #0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

View Source

PHP Shell Backdoors

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 20, 2014

This is a brief write up noting javascript backdoors left in usual PHP shells. View Source

T-Mobile To Pay $90M For Unauthorized Charges On Customers’ Bills

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

itwbennett writes T-Mobile US will pay at least $90 million to settle a Federal Communications Commission (FCC) suit that alleged it looked the other way while third parties charged T-Mobile subscribers for services they didn’t want. The settlement is the second largest ever for so-called ‘cramming,’ following one that the FCC reached with AT&T in[…]

#1337day ProjectSend – Cross Site Scripting Vulnerability CVE-2014-1155 [webapps #exploits #Vulnerability #0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

View Source

#1337day GQ File Manager 0.2.5 Sql Injection / Cross Site Scripting Vulnerabilities [#0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

View Source

#1337day Codiad 2.4.3 Cross Site Scripting / Local File Inclusion Vulnerabilities [#0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

View Source

#1337day Piwigo 2.7.2 SQL Injection / Cross Site Scripting Vulnerabilities [webapps #exploits #Vulnerabilities #0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

View Source

NASA Video Shows What It’s Like To Reenter the Earth’s Atmosphere

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

astroengine writes: In a mesmerizing new video released by NASA, the Dec. 5 reentry of the Orion test space vehicle is chronicled — & it’s a phenomenal 10-minute ride from fiery reentry to sudden splashdown into the Pacific Ocean. (YouTube Link.) Read more of this story at Slashdot. View Source

Ask Slashdot: Resources For Kids Who Want To Make Games?

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

Mr. Jones writes: My 11-year-old son is fascinated by games — game mechanics in particular. He has been playing everything from Magic to WarFrame since he was 5 years old. He seems mostly interested in creating the lore & associated mechanics of the games (i.e. how a game works). If it was only programming I[…]

Tesla About To Start Battery-Swap Pilot Program

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

cartechboy writes: Remember 18 months ago when Tesla promised it was going to launch battery-swap stations? Well, it’s finally happening, sort of. It seems Tesla’s approximately to announce a battery-swap pilot program that will launch next week. The swap site will be located across the street from a Tesla Supercharger site in Harris Ranch, California[…]

Geoengineered Climate Cooling With Microbubbles

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

Rambo Tribble writes: Scientists from the University of Leeds have proposed that brighter ships’ wakes, created by reducing their component bubbles’ sizes, could moderately increase the reflectivity of our oceans, which would have a cooling effect on the climate. The technology is touted as being available & simple, yet there could be side effects, like[…]

LinuxFest Northwest 2015 Will be Held April 25 and 26 (Video)

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

Their website says, ‘Come for the code, stay for the people! We have impressive attendees & electrifying parties. Check out the robotics club, the automated home brewing system running on Linux, or the game room for extra conference fun.’ This is an all-volunteer conference, & for a alter the volunteers who run it are getting[…]

JasPer 1.900.1 Double-Free / Heap Overflow

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

The JasPer project is an open source implementation for the JPEG-2000 codec. The library is affected by a double-free vulnerability in function jas_iccattrval_destroy() as well as a heap-based buffer overflow in function jp2_decode(). A specially crafted jp2 file, can be used to trigger the vulnerabilities. Versions 1.900.1 & below are affected. View Source

Schneier Explains How To Protect Yourself From Sony-Style Attacks (You Can’t)

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

phantomfive writes: Bruce Schneier has an opinion piece discussing the Sony attack. He says, “Your reaction to the massive hacking of such a prominent company will depend on whether you’re fluent in information-technology security. If you’re not, you’re probably wondering how in the world this could happen. If you are, you’re aware that this could[…]

Machine Learning Reveals Genetic Controls

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

An anonymous reader writes with this quote from Quanta Magazine: Most genetic research to date has focused on just 1 percent of the genome — the areas that code for proteins. But new research, published today in Science, provides an initial map for the sections of the genome that orchestrate this protein-building process. “It’s one[…]

The Dominant Life Form In the Cosmos Is Probably Superintelligent Robots

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

Jason Koebler writes: If & when we finally encounter aliens, they probably won’t look like little green men, or spiny insectoids. It’s likely they won’t be biological creatures at all, yet rather, advanced robots that outstrip our intelligence in every conceivable way. Susan Schneider, a professor of philosophy at the University of Connecticut, joins a[…]

All the Evidence the Government Will Present In the Silk Road Trial Is Online

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

apexcp writes: In less than a month, one of the biggest trials of 2015 will commence in New York City. The full list of government evidence & defense objections found its way online recently, shedding light on both the prosecutor’s courtroom strategy & the defense team’s attempted rebuttals. Also significant is what’s not presented as[…]

iBackup 10.0.0.45 Privilege Escalation

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

iBackup version 10.0.0.45 suffers from a privilege escalation vulnerability. View Source

Anyone Can Now Launch Their Own Version of the Pirate Bay

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

An anonymous reader writes: Not satisfied with merely launching The Old Pirate Bay, torrent site isoHunt today debuted The Open Bay, which lets anyone deploy their own version of The Pirate Bay online. This is achieved via a new six-step wizard, which the group says requires you to be somewhat tech-savvy & have “minimal knowledge[…]

Quantum Physics Just Got Less Complicated

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

wabrandsma sends this news from Phys.org: Here’s a nice surprise: quantum physics is less complicated than we thought. An international team of researchers has proved that two peculiar features of the quantum world previously considered distinct are different manifestations of the same thing. The result is published 19 December in Nature Communications. Patrick Coles, Jedrzej[…]

Hackers’ Shutdown of ‘The Interview’ Confirms Coding Is a Superpower

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

theodp writes: The idea of programming as a superpower was touched upon by CS teacher Alfred Thompson back in 2010, yet it became a rallying call of sorts for the Hour of Code after Dropbox CEO Drew Houston described coding as “the closest thing we have to a superpower” in a Code.org video that went[…]

TennisConnect 9.927 Cross Site Scripting

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

TennisConnect version 9.927 suffers from a cross site scripting vulnerability. View Source

Researchers Discover SS7 Flaw, Allowing Total Access To Any Cell Phone, Anywhere

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

krakman writes: Researchers discovered security flaws in SS7 that allow listening to private phone calls & intercepting text messages on a potentially massive scale – even when cellular networks are using the most advanced encryption now available. The flaws, to be reported at a hacker conference in Hamburg this month, are actually functions built into[…]

Skeptics Would Like Media To Stop Calling Science Deniers ‘Skeptics’

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

Layzej writes: Prominent scientists, science communicators, & skeptic activists, are calling on the news media to stop using the word “skeptic” when referring to those who refuse to accept the reality of climate change, & instead pertain to them by what they really are: science deniers. “Not all individuals who call themselves climate alter skeptics[…]

JCE-Tech 4.0 Cross Site Scripting

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

JCE-Tech version 4.0 suffers from a cross site scripting vulnerability. View Source

Scientists Discover That Exercise Changes Your DNA

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

HughPickens.com writes The human genome is astonishingly complex & dynamic, with genes constantly turning on or off, depending on what biochemical signals they receive from the body. Scientists have known that certain genes become active or quieter as a result of exercise yet they hadn’t understood how those genes knew how to respond to exercise.[…]

Colorado Sued By Neighboring States Over Legal Pot

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

SternisheFan notes that Nebraska & Oklahoma are suing Colorado over marijuana legalization. The attorneys general of Nebraska & Oklahoma sued Colorado in the U.S. Supreme Court on Thursday, arguing state-legalized marijuana from Colorado is improperly spilling across state lines. The suit invokes the federal government’s right to regulate both drugs & interstate commerce, & says[…]

Kepler Makes First Exoplanet Discovery After Mission Reboot

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

astroengine writes NASA’s Kepler space telescope has detected its first new extrasolar planet after mission engineers were able to save the mission from a premature death after two of the exoplanet hunter’s four stabilizing reaction wheels failed last year. Called “K2,” the extended mission arose from an “innovative idea” that appears to have given the[…]

Review: The BlackBerry Classic Is One of the Best Phones of 2009

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

Molly McHugh writes When Apple launched the iPhone in 2007, & I owned a BlackBerry Curve. To me, my BlackBerry was close to being the absolute perfect smartphone. Today, BlackBerry revealed the Classic, a phone that is designed to make me—and everyone who owned a BlackBerry before the touchscreen revolution—remember how much we loved them.[…]

FBI Confirms Open Investigation Into Gamergate

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

v3rgEz writes In a terse form letter responding to a FOIA request, the FBI has confirmed it has an open investigation into Gamergate, the loose yet controversial coalition of gamers calling for ethics in gaming journalism — even as some members have harassed & sent death threats to female gaming developers & critics. Read more[…]

Satellite Captures Glowing Plants From Space

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

sciencehabit writes About 1% of the light that strikes plants is re-emitted as a faint, fluorescent glow—a measure of photosynthetic activity. Today, scientists released a map of this glow as measured by the Orbiting Carbon Observatory-2, a NASA satellite launched in July with the goal of mapping the net amount of carbon in the atmosphere.[…]

Gentoo Linux Security Advisory 201412-31

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

Gentoo Linux Security Advisory 201412-31 – Multiple vulnerabilities in ZNC could lead to Denial of Service. Versions less than 1.2-r1 are affected. View Source

NetIQ Access Manager 4.0 SP1 XSS / CSRF / XXE Injection / Disclosure

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

NetIQ Access Manager version 4.0 SP1 suffers from cross site request forgery, external entity injection, information disclosure, & cross site scripting vulnerabilities. View Source

G-Parted 0.14.1 Command Execution

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

G-Parted versions 0.14.1 & below suffer from a root privilege escalation command execution vulnerability. View Source

VDG Security SENSE 2.3.13 File Disclosure / Bypass / Buffer Overflow

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

VDG Security SENSE version 2.3.13 suffers from buffer overflow, authentication bypass, file disclosure, password disclosure, & information leakage vulnerabilities. View Source

TWiki 6.0.0 / 6.0.1 WebSearch Cross Site Scripting

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

TWiki versions 6.0.0 & 6.0.1 suffer from a WebSearch cross site scripting vulnerability. View Source

TWiki 6.0.1 QUERYSTRING / QUERYPARAMSTRING XSS

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

TWiki version 6.0.1 suffers from a cross site scripting vulnerability in the QUERYSTRING & QUERYPARAMSTRING variables. View Source

Facebook Studio Cross Site Scripting

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

Facebook Studio suffered from a cross site scripting vulnerability. View Source

Red Hat Security Advisory 2014-2019-01

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

Red Hat Security Advisory 2014-2019-01 – Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was discovered that the Apache CXF incorrectly extracted the host name from an X.509 certificate subject’s Common Name field. A man-in-the-middle attacker could use this flaw to spoof an[…]

Red Hat Security Advisory 2014-2020-01

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

Red Hat Security Advisory 2014-2020-01 – Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was discovered that the Apache CXF incorrectly extracted the host name from an X.509 certificate subject’s Common Name field. A man-in-the-middle attacker could use this flaw to spoof an[…]

Red Hat Security Advisory 2014-2023-01

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

Red Hat Security Advisory 2014-2023-01 – The glibc packages provide the standard C libraries, POSIX thread libraries, standard math libraries, & the Name Server Caching Daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. It was found that the wordexp() function would perform command substitution even when[…]

Red Hat Security Advisory 2014-2021-01

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

Red Hat Security Advisory 2014-2021-01 – JasPer is an implementation of Part 1 of the JPEG 2000 image compression standard. Multiple off-by-one flaws, leading to heap-based buffer overflows, were found in the way JasPer decoded JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash or, possibly, execute arbitrary[…]

E-Journal CMS SQL Injection / Privilege Escalation

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

E-Journal CMS suffers from remote SQL injection & privilege escalation vulnerabilities. View Source

Investigation: Apple Failing To Protect Chinese Factory Workers

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

mrspoonsi writes with the findings of an investigation into working conditions at a factory that makes Apple products. Poor treatment of workers in Chinese factories which make Apple products has been discovered by an undercover BBC Panorama investigation. Filming on an iPhone 6 production line showed Apple’s promises to protect workers were routinely broken. It[…]

Critical Git Security Vulnerability Announced

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: December 19, 2014

An anonymous reader writes Github has announced a security vulnerability & has encourage users to update their Git clients as shortly as possible. The blog post reads in part: “A critical Git security vulnerability has been announced today, affecting all versions of the official Git client & all related software that interacts with Git repositories,[…]

Tags
Online Now
Welcome , today is Monday, December 22, 2014