New Privacy Threat: Automated Vehicle Occupancy Detection

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 28, 2015

An anonymous reader writes: The Electronic Frontier Foundation is warning against a new potential privacy threat: cameras that look inside cars & try to identify how many people are inside. This technology is a natural combination of simpler ones that have existed for years: basic object recognition software & road-side cameras (red light cameras, speeding[…]

InFocus IN3128HD Projector Missing Authentication

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 28, 2015

Core Security Technologies Advisory – The InFocus IN3128HD Projector is vulnerable to an authentication bypass in its web interface login page, & is missing authentication for the “webctrl.cgi.elf” CGI file, which allows several actions to be performed or configured inside the device. Firmware 0.26 is verified vulnerable. View Source

Mandriva Linux Security Advisory 2015-212

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 28, 2015

Mandriva Linux Security Advisory 2015-212 – An off-by-one flaw, leading to a buffer overflow, was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions.[…]

DAWIN – Distributed Audit and Wireless Intrustion Notification 2.0

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 28, 2015

DA-WIN, a wireless IDS, provides an organization a continuous wireless scanning capability that is light touch & simple. It utilizes compact & discreet sensors that can easily be deployed reducing the total cost of protection & simplifying the effort required for absolute, categoric regulatory compliance. This archive includes a dd image to be used on[…]

ProjectSend r561 CSRF / XSS / Shell Upload

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 28, 2015

ProjectSend version r561 suffers from cross site request forgery, cross site scripting, & remote shell upload vulnerabilities. View Source

WordPress Exquisite Ultimate Newspaper 1.3.3 Cross Site Scripting

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 28, 2015

WordPress Exquisite Ultimate Newspaper theme version 1.3.3 suffers from a cross site scripting vulnerability. View Source

The Engineer’s Lament — Prioritizing Car Safety Issues

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 28, 2015

An anonymous reader writes: Malcolm Gladwell has an article in The New Yorker approximately how automotive engineers handle issues of safety. There have been tons of car-related recalls lately, & even before that, we’d often hear approximately how some piece of engineering on a car was leading to a bunch of deaths. Sometimes it was[…]

Holographic Principle Could Apply To Our Universe

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

New submitter citpyrc sends this news from the Vienna University of Technology: The “holographic principle” asserts that a mathematical description of the universe actually requires one fewer dimension than it seems. What we perceive as three dimensional may just be the image of two dimensional processes on a huge cosmic horizon. Up until now, this[…]

An Open Ranking of Wikipedia Pages

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

vigna writes: The Laboratory for Web Algorithmics of the Università degli studi di Milano did it again: after creating the first open ranking of the World Wide Web they have put together the first entirely open ranking of Wikipedia, using Wikidata to categorize pages. The ranking is based on classic & easily explainable centrality measures[…]

Alibaba Looks To Rural China To Popularize Its Mobile OS

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

itwbennett writes: E-commerce giant Alibaba Group hasn’t given up on its YunOS mobile operating system, & is taking the software to China’s rural markets through a series of low-cost phones, which will be built by lesser-known Chinese brands & will range from 299 yuan ($49) to 699 yuan. Slashdot readers may remember that in 2012,[…]

#1337day WordPress WooCommerce Amazon Affiliates 7.0 Shell Upload / File Disclosure Vulnerabilities [#0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

View Source

#1337day Legend Perl IRC Bot Remote Code Execution Exlpoit [remote #exploits #0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

View Source

#1337day MiniUPnPd 1.0 – Stack Overflow RCE for AirTies RT Series (MIPS) Exploit [#0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

View Source

Texas Admonishes Judge For Posting Facebook Updates About Her Trials

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

An anonymous reader writes: Michelle Slaughter, a Galveston County judge, says she will appeal a public admonition from state officials that criticized her Facebook posts approximately cases brought before her court. From the article: “The State Commission on Judicial Conduct ordered Michelle Slaughter, a Galveston County judge, to enroll in a four-hour class on the[…]

Imagination To Release Open MIPS Design To Academia

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

DeviceGuru writes: Imagination Technologies has developed a Linux-ready academic version of its 32-bit MIPS architecture MicroAptiv processor design, & is giving it away free to universities for use in computer research & education. As the MIPSfpga name suggests, the production-quality RTL (register transfer level) design abstraction is intended to run on industry standard FPGAs. Although[…]

Supreme Court To Consider Data Aggregation Suit Against Spokeo

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

BUL2294 writes: Consumerist & Associated Press are reporting that the Supreme Court has taken up the case of Spokeo, Inc. v. Robins — a case where Spokeo, as a data aggregator, faces legal liability & Fair Credit Reporting Act violations for providing information on Thomas Robins, an individual who has not suffered “a specific harm”[…]

JavaScript Devs: Is It Still Worth Learning JQuery?

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

Nerval’s Lobster writes: If you’re learning JavaScript & Web development, you might be wondering whether to learn jQuery. After nearly a decade of existence, jQuery has grown into a fundamental part of JavaScript coding in Web development. But now we’re at a point where many of the missing pieces (and additional features) jQuery filled in[…]

#1337day UniPDF Version 1.2 – 'xml' Buffer Overflow Crash PoC [dos #exploits #0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

View Source

#1337day Free MP3 CD Ripper 2.6 2.8 (.wav) – SEH Based Buffer Overflow (W7 – DEP Bypass) Exploit [#0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

View Source

#1337day Quick Search 1.1.0.189 – search textbox Unicode SEH egghunter Buffer Overflow Exploit [#0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

View Source

#1337day Free MP3 CD Ripper 2.6 2.8 (.wav) – SEH Based Buffer Overflow Exploit [remote #exploits #0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

View Source

#1337day Ultimate Product Catalogue WordPress Plugin – SQL Injecton Vulnerabilities [#0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

View Source

Smart Headlights Adjust To Aid Drivers In Difficult Conditions

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

An anonymous reader writes: Researchers at Carnegie Mellon University’s Robotics Institute are developing smart headlights that not only trace a car’s movement around bends, yet are programmable to assist a driver in a wide range of driving conditions. The research team, at the institute’s Illumination & Imaging Laboratory, is looking into designing headlights which do[…]

#1337day WordPress 4.2 – Stored XSS Vulnerability [webapps #exploits #Vulnerability #0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

View Source

#1337day OTRS < 3.1.x & < 3.2.x & < 3.3.x – Stored Cross-Site [#0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

View Source

ESPN Sues Verizon To Stop New Sports-Free TV Bundles

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

Mr D from 63 writes: ESPN isn’t a fan of Verizon’s new way of offering cable channels under its Fios TV service & is suing. The lawsuit comes after Verizon unveiled new bundles that allow customers to select specific packages of channels that can be swapped every 30 days. ESPN claims this offer is not[…]

Has the Native Vs. HTML5 Mobile Debate Changed?

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

itwbennett writes: The tools available to developers who need to build an application once & deploy everywhere have exploded. Frameworks like famo.us, Ionic, PhoneGap, Sencha Touch, Appcelerator, Xamarin, & others are reducing the grunt work & improving the overall quality of web based mobile applications dramatically. The benefits of a build once, deploy everywhere platform[…]

oclHashcat For NVidia 1.36

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

oclHashcat is an advanced GPU hash cracking utility that includes the World’s fastest md5crypt, phpass, mscash2 & WPA / WPA2 cracker. It moreover has the first & only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, & more. NVidia version. View Source

oclHashcat For AMD 1.36

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

oclHashcat is an advanced GPU hash cracking utility that includes the World’s fastest md5crypt, phpass, mscash2 & WPA / WPA2 cracker. It moreover has the first & only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, & more. AMD version. View Source

The Sun Newspaper Launches Anonymous Tor-Based WikiLeaks-Style SecureDrop

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

Mark Wilson writes: The likes of Julian Assange’s WikiLeaks have set the standard for blowing the lid on huge stories based on tips from anonymous sources. Whistle-blowers such as Edward Snowden have brought to public attention stories which would otherwise have been kept hidden from the public, & it has been with the assist of[…]

FireHOL 2.0.3

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers & servers, & all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source[…]

Ubuntu Security Notice USN-2570-1

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

Ubuntu Security Notice 2570-1 – An issue was discovered in the HTML parser in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass same-origin restrictions. An issue was discovered in the Web Audio API implementation in Blink. If a user were tricked in[…]

Open-Xchange Server 6 / OX AppSuite Cross Site Scripting

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

Open-Xchange Server 6 & OX AppSuite versions 7.6.1 & below suffer from multiple cross site scripting vulnerabilities. View Source

Elasticsearch Directory Traversal

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

All Elasticsearch versions prior to 1.5.2 & 1.4.5 are vulnerable to a directory traversal attack that allows an attacker to retrieve files from the server running Elasticsearch. View Source

WordPress 4.2 Cross Site Scripting

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

WordPress version 4.2 suffers from a persistent cross site scripting vulnerability. View Source

Google Launches a Marketplace To Buy Patents From Interested Sellers

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

An anonymous reader writes: Google has announced an experimental marketplace called the Patent Purchase Promotion, which aims to keep patents out of the hands of patent trolls. From the announcement: “By simplifying the process & having a concentrated submission window, we can focus our efforts into quickly evaluating patent assets & getting responses back to[…]

Ubuntu Security Notice USN-2580-1

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

Ubuntu Security Notice 2580-1 – It was discovered that tcpdump incorrectly handled printing certain packets. A remote attacker could use this issue to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code. In the default installation, attackers would be isolated by the tcpdump AppArmor profile. View Source

Mandriva Linux Security Advisory 2015-211

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

Mandriva Linux Security Advisory 2015-211 – glusterfs was vulnerable to a fragment header infinite loop denial of service attack. Also, the glusterfsd SysV init script was failing to properly start the service. This was fixed by replacing it with systemd unit files for the service that work properly. View Source

Mandriva Linux Security Advisory 2015-210

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

Mandriva Linux Security Advisory 2015-210 – A denial of service flaw was found in the way QEMU handled malformed Physical Region Descriptor Table data sent to the host’s IDE and/or AHCI controller emulation. A privileged guest user could use this flaw to crash the system. It was found that the QEMU’s websocket frame decoder processed[…]

Mandriva Linux Security Advisory 2015-209

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

Mandriva Linux Security Advisory 2015-209 – Update PHP packages address buffer over-read & overflow vulnerabilities. PHP has been updated to version 5.5.24, which fixes these issues & other bugs. Additionally the timezonedb packages has been upgraded to the latest version & the PECL packages which requires so has been rebuilt for php-5.5.24. View Source

Mandriva Linux Security Advisory 2015-208

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

Mandriva Linux Security Advisory 2015-208 – An issue has been identified in Mandriva Business Server 2’s setup package where the /etc/shadow & /etc/gshadow files containing password hashes were created with incorrect permissions, making them world-readable. This update fixes this issue by enforcing that those files are owned by the root user & shadow group, &[…]

Mandriva Linux Security Advisory 2015-207

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

Mandriva Linux Security Advisory 2015-207 – Updated perl-Module-Signature package fixes the following security Module::Signature could be tricked into interpreting the unsigned portion of a SIGNATURE file as the signed portion due to faulty parsing of the PGP signature boundaries. When verifying the contents of a CPAN module, Module::Signature ignored some files in the extracted tarball[…]

Mandriva Linux Security Advisory 2015-206

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

Mandriva Linux Security Advisory 2015-206 – When Asterisk registers to a SIP TLS device & & verifies the server, Asterisk will accept signed certificates that match a usual name other than the one Asterisk is expecting if the signed certificate has a usual name containing a null byte after the portion of the usual name[…]

Mandriva Linux Security Advisory 2015-205

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

Mandriva Linux Security Advisory 2015-205 – disgleirio discovered that a malicious client could trigger an assertion failure in a Tor instance providing a hidden service, thus rendering the service inaccessible. DonnchaC discovered that Tor clients would crash with an assertion failure upon parsing specially crafted hidden service descriptors. Introduction points would accept multiple INTRODUCE1 cells[…]

Ubuntu Security Notice USN-2579-1

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

Ubuntu Security Notice 2579-1 – It was discovered that autofs incorrectly filtered environment variables when using program maps. When program maps were configured, a local user could use this issue to escalate privileges. This update changes the default behavior by adding a prefix to environment variables. Sites using program maps will need to adapt to[…]

Mandriva Linux Security Advisory 2015-204

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

Mandriva Linux Security Advisory 2015-204 – librsync before 1.0.0 used a truncated MD4 strong check sum to match blocks. However, MD4 is not cryptographically strong. It’s possible that an attacker who can control the contents of one part of a file could use it to control other regions of the file, if it’s transferred using[…]

Debian Security Advisory 3238-1

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

Debian Linux Security Advisory 3238-1 – Several vulnerabilities were discovered in the chromium web browser. View Source

Debian Security Advisory 3237-1

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

Debian Linux Security Advisory 3237-1 – Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. View Source

Ubuntu Security Notice USN-2578-1

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

Ubuntu Security Notice 2578-1 – Alexander Cherepanov discovered that LibreOffice incorrectly handled certain RTF files. If a user were tricked into opening a specially crafted RTF document, a remote attacker could cause LibreOffice to crash, & possibly execute arbitrary code. It was discovered that LibreOffice incorrectly handled certain HWP files. If a user were tricked[…]

Pepsi To Stop Using Aspartame

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

An anonymous reader writes: Pepsi believes sales of diet soda are falling because of aspartame & how the general public think it is a dangerous substance to consume. Even though the FDA describe aspartame as “one of the most thoroughly tested & studied food additives the agency has ever approved,” Pepsi has decided to stop[…]

Indian Telecom Authority Releases a Million Email IDs, Taken Down By Hackers

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

knwny writes: In a bizarre move that threatens the privacy of over a million internet users in India, the Telecom Regulatory Authority of India (TRAI) has released the list of email IDs from which it received responses regarding net neutrality. Most of these responses were sent by the general public following a massively popular online[…]

Conde Nast To Announce VR Series

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

An anonymous reader writes: Lifestyle & fashion publishing giant Conde Nast is planning to move into virtual reality in an effort to trial new marketing & advertising streams to attract digital consumers. The privately-owned company is expected to announce two new virtual reality series hosted by its TV & film division, Conde Nast Entertainment (CNE),[…]

Audi Creates "Fuel of the Future" Using Just Carbon Dioxide and Water

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

EwanPalmer writes: German car manufacturer Audi says it has created the “fuel of the future” made solely from water, carbon dioxide & renewable sources. The synthetic “e-diesel” was made following a commissioning phase of just four months at a plant in Dresden, Germany. Germany’s federal minister of education & research, Dr Johanna Wanka, said she[…]

Stephen Hawking Has a Message For One Direction Fans

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

An anonymous reader points out that Stephen Hawking recently gave some advice for One Direction fans. What is the cosmological effect of singer Zayn Malik leaving the best-selling boy band One Direction & consequently disappointing millions of teenage girls around the world? The advice of British cosmologist Stephen Hawking to heartbroken fans is to follow[…]

Google Officially Discontinues Nexus 7 Tablet

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

An anonymous reader writes: Google’s 7-inch tablet has disappeared from the Google Store, where a note in red type simply states that the device is no longer available for purchase. “The Nexus 7 was first released back in 2013, so it’s fair to say it had a satisfactory run. The Android-based tablet received tremendous reviews,[…]

Pandora Paying Artists $0.0001 More Per Stream Than It Was Last Year

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

journovampire writes: Pandora has revealed that it’s paying a 10,000th of a dollar more to music labels & artists than it was in 2014. From the article: “Pandora has revealed that its royalty payments to SoundExchange, the US licensing body which collects performance royalties on behalf of record labels & artists, have just increased by[…]

Robots Step Into the Backbreaking Agricultural Work That Immigrants Won’t Do

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

HughPickens.com writes: Ilan Brat reports at the WSJ that technological advances are making it possible for robots to handle the backbreaking job of gently plucking ripe strawberries from below deep-green leaves, just as the shrinking supply of available fruit pickers has made the technology more financially attractive. “It’s no longer a problem of how much[…]

VideoSpirit Pro 1.91 Buffer Overflow

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

VideoSpirit Pro version 1.91 buffer overflow with SEH bypass exploit. View Source

Linux 4.1 Bringing Many Changes, But No KDBUS

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

An anonymous reader writes: The first release candidate of Linux 4.1 has been released, Linus noted, “The merge window is pretty normal in terms of what received merged too. Just eyeballing the size, it looks like this is going to fit right in — while 4.0 was a bit smaller than usual, 4.1 seems to[…]

The World of 3D Portraiture

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

An anonymous reader writes in with this BBC story approximately the niche market of 3D printed “selfie” models. By now we’re familiar with tales of 3D-printed marvels, from guns to duck prosthetics. But when I traveled to a physics conference in March, I wasn’t expecting to end up with a full colour printout of myself.[…]

Legend Perl IRC Bot Remote Code Execution

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

Simple proof of concept tool to leverage remote code execution on the Legend perl IRC bot. View Source

Google Insiders Talk About Why Google+ Failed

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

An anonymous reader writes in with this story approximately what happened to Google+ from an employee perspective. “Last month, Google announced that it’s changing up its strategy with Google+. In a sense, it’s giving up on pitching Google+ as a social network aimed at competing with Facebook. Instead, Google+ will become two separate pieces: Photos[…]

When Exxon Wanted To Be a Personal Computing Revolutionary

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 27, 2015

An anonymous reader writes with this story approximately Exxon’s early involvement with consumer computers. “This weekend is the anniversary of the release of the Apple IIc, the company’s fourth personal computer iteration & its first attempt at creating a portable computer. In 1981, Apple’s leading competitor in the world of consumer (‘novice’) computer users was[…]

The Future Deconstruction of the K-12 Teacher

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 26, 2015

An anonymous reader writes: English teacher Michael Godsey writes in The Atlantic what he envisions the role of teachers to be in the future. In a nutshell, he sees virtual classrooms, less pay, & a drastic decrease in the number of educators, yet thinks they will all be “super-teachers”. From the article: “Whenever a college[…]

Officials Say Russian Hackers Read Obama’s Unclassified Emails

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 26, 2015

An anonymous reader points out that Russian hackers reportedly obtained some of President Obama’s emails when the White House’s unclassified computer system was hacked last year. Some of President Obama’s email correspondence was swept up by Russian hackers last year in a breach of the White House’s unclassified computer system that was far more intrusive[…]

Google Executive Dan Fredinburg Among Victims of Everest avalanche

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 26, 2015

alphadogg writes: Dan Fredinburg, privacy director for the company’s Google X team, & an engineer who worked on many of Google’s most thrilling projects during his 8 years with the company, died over the weekend in an avalanche on Mount Everest. The 33-year-old worked on projects such as Google Loon, the company’s balloon-based Internet access[…]

Seeing Buildings Shake With Software

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 26, 2015

mikejuk writes: In 2012 a team from MIT CSAIL discovered that you could obtain motion magnification by applying filtering algorithms to the color changes of individual pixels. The method didn’t track movement directly, yet instead used the color changes that result from the movement. Now another MIT team has attempted to put the technique to[…]

Intel Showcases RealSense 3D Camera Applications and Technologies In New York

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 26, 2015

MojoKid writes: Intel gathered a number of its OEM & software partners together in New York City recently to showcase the latest innovations that the company’s RealSense 3D camera technology can enable. From new interactive gaming experiences to video collaboration, 3D mapping & gesture controls, Intel’s front-facing RealSense technology holds promise that could someday reinvent[…]

Cosmologists Find Eleven Runaway Galaxies

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 26, 2015

An anonymous reader writes: Discovery News reports that 11 homeless galaxies have been identified by Igor Chilingarian, an astronomer at the Harvard-Smithsonian Center for Astrophysics, & Moscow State University, & his fellow astronomers. “The 11 runaway galaxies were found by chance while Chilingarian & co-investigator Ivan Zolotukhin, of the L’Institut de Recherche en Astrophysique et[…]

Commix Command Injection Tool

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 26, 2015

Commix (short for [comm]and [i]njection e[x]ploiter) has a simple environment & it can be used, from web developers, penetration testers or even security researchers to test web applications with the view to find bugs, errors or vulnerabilities related to command injection attacks. By using this tool, it is very effortless to find & exploit a[…]

Woman Behind Pakistan’s First Hackathon, Sabeen Mahmud, Shot Dead

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 26, 2015

An anonymous reader sends word that Sabeen Mahmud, a prominent Pakistani social & human rights activist, has been shot dead. The progressive activist & organizer who ran Pakistan’s first-ever hackathon & led a human rights & a peace-focused nonprofit known as The Second Floor (T2F) was shot dead by unidentified gunmen in Karachi. Sabeen Mahmud[…]

Apple’s Next Frontier Is Your Body

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 26, 2015

Lashdots writes: Amid the unveiling of the Apple Watch, Tim Cook’s wrist distracted from another new product last month: ResearchKit, an open source iOS platform designed to assist researchers design apps for medical studies—and reach millions of potential research subjects through their iPhones. Alongside the company’s new frontiers, like the car & the home, Cook[…]

Nepal Earthquake: Facebook To Google, How Tech Is Helping Survivors Reach Out

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 26, 2015

An anonymous reader writes: In the aftermath of the earthquake that struck Nepal, many social media sites & mobile applications have come up with features that could assist locate friends & loved ones. From the Times of India: “Social networking website Facebook, & Google’s Person Finder have helped locate the whereabouts of those stranded in[…]

Tiny Robots Climb Walls Carrying More Than 100 Times Their Weight

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 26, 2015

schwit1 writes: Mighty things come in small packages. The little robots in this video can haul things that weigh over 100 times more than themselves. The super-strong bots — built by mechanical engineers at Stanford — will be presented next month at the International Conference on Robotics & Automation in Seattle, Washington. The secret is[…]

WordPress WooCommerce Amazon Affiliates 7.0 Shell Upload / File Disclosure

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 26, 2015

WordPress WooCommerce Amazon Affiliates plugin version 7.0 suffers from file disclosure & remote shell upload vulnerabilities. View Source

In New AI Benchmark, Computer Takes On Four Top Professional Poker Players

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 26, 2015

HughPickens.com writes: Stephen Jordan reports at the National Monitor that four of the world’s greatest poker players are going into battle against a computer program that researchers are calling Claudico in the “Brains Vs. Artificial Intelligence” competition at Rivers Casino in Pittsburgh. Claudico, the first machine program to play heads-up no-limit Texas Hold’em against top[…]

Declassified Report From 2009 Questions Effectiveness of NSA Spying

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 26, 2015

schwit1 writes: With debate gearing up over the coming expiration of the Patriot Act surveillance law, the Obama administration on Saturday unveiled a 6-year-old report examining the once-secret program code-named Stellarwind, which collected information on Americans’ calls & emails. The report was from the inspectors general of various intelligence & law enforcement agencies. They found[…]

Debian 8 Jessie Released

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 26, 2015

linuxscreenshot writes: After almost 24 months of constant development, the Debian project is proud to present its new stable version 8 (code name Jessie), which will be supported for the next five years thanks to the combined work of the Debian Security team & the Debian Long Term Support team. (Release notes.) Jessie ships with[…]

Random Generator Parodies Vapid Startup Websites

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 26, 2015

alphadogg writes: A pair of Georgia Tech computer science students have created a Random Startup Website Generator that spits out a different jargon-laden startup website every time you click on the URL. Mike Bradley & Tiffany Zhang’s project “serves as a parody of startups that have websites full of vague praise & little information approximately[…]

Think Tanks: How a Bill [Gates Agenda] Becomes a Law

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 26, 2015

theodp writes: The NY Times’ Eric Lipton was just awarded a 2015 Pulitzer Prize for investigative reporting that shed light on how foreign powers buy influence at think tanks. So, it probably bears mentioning that Microsoft’s ‘two-pronged’ National Talent Strategy (PDF) to increase K-12 CS education & the number of H-1B visas — which is[…]

Ask Slashdot: What Are the Most Stable Smartphones These Days?

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 25, 2015

janimal writes: The iPhone used to be the smartphone that “just works.” Ever since the 4S days, this has been true less & less with each generation. My wife’s iPhone 6 needs to be restarted several times per week for things like internet search or making calls to work. An older 5S I’m using moreover[…]

FCC Chairman: a Former Cable Lobbyist Who Helped Kill the Comcast Merger

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 25, 2015

An anonymous reader writes: After Friday’s news that the Comcast/TWC merger is dead, the Washington Post points out an absorbing fact: FCC Chairman Tom Wheeler, who was instrumental in throwing up roadblocks for the deal, used to be a lobbyist for the cable & wireless industry. “Those who predicted Wheeler would favor industry interests ‘misunderstood[…]

Oculus Rift: 2015 Launch Unlikely, But Not Impossible

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 25, 2015

An anonymous reader writes: Earlier this week during Facebook’s 2015 Q1 earnings call, the company seemed to suggest that a 2015 Oculus Rift release date was unlikely. At least, that’s what a report approximately the call from Gamasutra indicated, saying, “It doesn’t sound like Oculus will ship the consumer version of its Oculus Rift VR[…]

Liquid Mercury Found Under Mexican Pyramid

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 25, 2015

An anonymous reader writes: An archaeologist has discovered liquid mercury at the end of a tunnel beneath a Mexican pyramid, a finding that could suggest the existence of a king’s tomb or a ritual chamber far below one of the most ancient cities of the Americas. Mexican researcher Sergio Gómez … has spent six years[…]

Vizio, Destroyer of Patent Trolls

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 25, 2015

An anonymous reader writes: We read approximately a lot of patent troll cases. Some are successful & some are not, yet many such cases are decided before ever going to court. It’s how the patent troll operates — they know exactly how high litigation costs are. Even without a legal leg to stand on, they[…]

A Guide To the 5 Cybersecurity Bills Now Before Congress

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 25, 2015

blottsie writes: At press time, the House had passed two cybersecurity bills, one Senate bill had been passed out of committee & reported to the full chamber for a final vote, & a third House bill & a second Senate bill were awaiting review by the appropriate committee. The two House bills that passed earlier[…]

Giant Survival Ball Will Help Explorer Survive a Year On an Iceberg

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 25, 2015

HughPickens.com writes: Ben Yeager reports in Outside Magazine that Italian explorer Alex Bellini plans to travel to Greenland’s west coast, pick an iceberg, & live on it for a year as it melts out in the Atlantic. It’s a precarious idea. Bellini will be completely isolated, & his adopted dwelling is liable to roll or[…]

Turning a Smartphone Display Into a Biometric Scanner

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 25, 2015

New submitter jan_jes writes: Recent mobile phones integrate fingerprint scanners to authenticate users biometrically & replace passwords, making authentication more convenient. Researchers at Yahoo Labs have created a new technology called “Bodyprint,” which turns your smartphone’s touchscreen display into a biometric scanner. It allows the touch sensor to scan users’ body parts (PDF) such as[…]

Microsoft Increases Android Patent Licensing Reach

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 25, 2015

BrianFagioli writes: Microsoft may not be winning in the mobile arena, yet they’re still making tons of money from those who are. Patent licensing agreements net the company billions each year from device makers like Samsung, Foxconn, & ZTE. Now, Microsoft has added another company to that list: Qisda Corp. They make a number of[…]

Debian Security Advisory 3236-1

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 25, 2015

Debian Linux Security Advisory 3236-1 – It was discovered that missing input sanitising in Libreoffice’s filter for HWP documents may result in the execution of arbitrary code if a malformed document is opened. View Source

Debian Security Advisory 3235-1

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 25, 2015

Debian Linux Security Advisory 3235-1 – Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in the execution of arbitrary code, breakouts of the Java sandbox, information disclosure or denial of service. View Source

7.8 Earthquake Rocks Nepal, Hundreds Dead

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 25, 2015

An anonymous reader writes: Nepal was struck by an earthquake of magnitude 7.8 today, with an epicenter 80 km east of the country’s second biggest city, Pokhara. Its effects were moreover strongly felt in the capital, Kathmandu. Casualty reports conflict, yet authorities have indicated at least 500 are dead & many more are feared to[…]

Tesla To Announce Battery-Based Energy Storage For Homes

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 25, 2015

Okian Warrior writes: Billionaire Elon Musk will announce next week that Tesla will commence offering battery-based energy storage for residential & commercial customers. The batteries power up overnight when energy companies typically charge less for electricity, then are used during the day to power a home. In a pilot project, Tesla has already begun offering[…]

Mystery of the Coldest Spot In the CMB Solved

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 25, 2015

StartsWithABang writes: The cosmic microwave background is a thing of beauty, as not only does its uniform, cold temperature reveal a hot, dense past that began with the hot Big Bang, yet its fluctuations reveal a pattern of overdensities & underdensities in the very early stages of the Universe. It’s fluctuations just like these that[…]

Pirate Bay Blockade Censors CloudFlare Customers

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 25, 2015

An anonymous reader writes: The blockade of the Pirate Bay by UK ISPs is causing trouble for CloudFlare customers. Several websites have been inadvertently blocked by Sky because a Pirate Bay proxy is hosted behind the same IP-addresses. In a response, CloudFlare threatened to disconnect the proxy site from its network. Like any form of[…]

Microsoft Opens Vulnerability Bounty Program For Spartan Browser

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 25, 2015

jones_supa writes: As it did in the past when it tried to make Internet Explorer more secure, Microsoft has launched a new bug bounty program for Spartan browser, the default application of Windows 10 for surfing the information highway. A typical remote code execution flaw can bring between $1,500 & $15,000, & for the top[…]

Buggy Win 95 Code Almost Wrecked Stuxnet Campaign

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: April 25, 2015

mask.of.sanity writes: Super-worm Stuxnet could have blown its cover & failed its sabotage mission due to a bug that allowed it to spread to ancient Windows boxes, malware analysts say. Stuxnet was on the brink of failure thanks to buggy code allowing it to spread to PCs running older & unsupported versions of Windows, &[…]

Debian Security Advisory 3234-1

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 24, 2015

Debian Linux Security Advisory 3234-1 – Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in the execution of arbitrary code, breakouts of the Java sandbox, information disclosure or denial of service. View Source

HP Security Bulletin HPSBHF03272 1

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 24, 2015

HP Security Bulletin HPSBHF03272 1 – A potential security vulnerability has been identified with certain HP Servers with NVidia GPU Computing Driver running Windows Server 2008. This vulnerability could be exploited resulting in elevation of privilege. Revision 1 of this advisory. View Source

HP Security Bulletin HPSBPI03315 1

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: April 24, 2015

HP Security Bulletin HPSBPI03315 1 – A potential security vulnerability has been identified with HP Capture & Route Software. The vulnerability could be exploited remotely resulting in information disclosure. Revision 1 of this advisory. View Source

Tags
Online Now
Welcome , today is Tuesday, April 28, 2015