MIT Trains Robots To Jump

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 29, 2015

Nerval’s Lobster writes: MIT just announced that its researchers have programmed a robotic cheetah that can leap over obstacles without a prompt from a human controller. The machine’s onboard sensors rely on reflected laser-light to judge obstacles’ distance & height, & use that data to fuel the algorithm for a safe jump. The robot’s controlling[…]

Uber Revises Privacy Policy, Wants More Data From Users

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 29, 2015

itwbennett tips news that Uber has amended its privacy policy, making it much simpler to read & understand. But the policy moreover includes changes to what data Uber collects approximately its riders. Beginning July 15th, the Uber phone app will keep track of a rider’s location while it’s running in the background. Uber says riders[…]

The Underground Hacking Economy

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 29, 2015

Fast Company profiles the rise of sites like Hackers List & Hackers For Hire, which provide consolidated markets for people to hire hackers to break passwords, alter databases, learn to operate malware, & more. People with the skills to circumvent security are putting themselves out there as freelancers for specific tasks, & people in need[…]

Crowdfunded, Solar-powered Spacecraft Goes Silent

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 29, 2015

Last week saw the successful launch of the Planetary Society’s LightSail spacecraft, the solar-powered satellite that runs Linux & was crowdfunded on Kickstarter. The spacecraft worked flawlessly for two days, yet then fell silent, & the engineering team has been working complex on a fix ever since. They’ve pinpointed the problem: a software glitch. “Every[…]

Hacked Emails Reveal Russian Plans To Obtain Sensitive Western Tech

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 29, 2015

blando writes: A trove of emails provided to The Intercept detail Russian schemes to obtain a crucial component for military thermal-imaging systems. Though emails approximately the thermal imaging systems date back as far as 2006, the plans to acquire them began in earnest much more recently, in 2013. To try to hide Russian involvement, a[…]

Feds Bust a Dark-Web Counterfeit Coupon Kingpin

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 29, 2015

Sparrowvsrevolution writes: The dark web has become the go-to corner of the Internet to buy drugs, stolen financial data, guns…and counterfeit coupons for Clif bars & condoms? The FBI indicted Beauregard Wattigney yesterday for wire fraud & trademark counterfeiting on digital black market sites Silk Road & Silk Road 2. Wattigney allegedly spoofed coupons for[…]

Chinese Nationals Accused of Taking SATs For Others

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 29, 2015

Vadim Makarov writes: Fifteen Chinese nationals living in the U.S. have been charged with creating an elaborate scheme to take U.S. college entrance exams on behalf of students. For the past four years, the accused provided counterfeit Chinese passports to impostors, who sneaked into testing centers where they took the Scholastic Aptitude Test (SAT), the[…]

DARPA Wants You To Verify Software Flaws By Playing Games

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 29, 2015

coondoggie writes: Researchers at the Defense Advanced Research Projects Agency (DARPA) think online gamers can perform the tedious software verification work typically done by professional coding experts. They were so impressed with their first crowdsourced flaw-detecting games, they announced an new round of five games this week designed for improved playability as well as increased[…]

Australia’s Prime Minister Doesn’t Get Why Kids Should Learn To Code

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 29, 2015

New submitter Gob Gob writes: The Prime Minister of Australia has come out & ridiculed an opposition policy aimed at teaching kids to code. In response to the leader of the Labor Party’s question approximately whether he would commit to supporting Labor’s push to have coding taught in every primary school in Australia, the Prime[…]

Billboard Advertising Banned Products In Russia Hides If It Recognizes Cops

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 29, 2015

m.alessandrini writes: In response to a ban of food imported from the European Union, an Italian grocery in Russia hired an ad agency to create a billboard with a camera & facial recognition software, that’s able to alter to a different ad when it recognizes the uniform of Russian cops. Gizmodo reports: “With the aid[…]

JSPAdmin 1.1 SQL Injection / CSRF / Cross Site Scripting

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 29, 2015

JSPAdmin version 1.1 suffers from cross site request forgery, cross site scripting, & remote SQL injection vulnerabilities. View Source

22 SOHO Router Vulnerabilities Discovered

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 29, 2015

SOHO routers have been found vulnerable to privilege escalation, information disclosure, cross site request forgery, cross site scripting, authentication bypass, denial of service, & various other vulnerabilities. View Source

HP Security Bulletin HPSBHF03340 1

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 29, 2015

HP Security Bulletin HPSBHF03340 1 – A potential security vulnerability has been identified with HP ThinPro Linux & HP Smart Zero Core running HP Easy Setup Wizard. The vulnerability could result in local unauthorized access & elevation of privilege on an HP thin client device. Revision 1 of this advisory. View Source

Ask Slashdot: What Happens If We Perfect Age Reversing?

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 29, 2015

ourlovecanlastforeve writes: With biologists getting closer & closer to reversing the aging process in human cells, the reality of greatly extended life draws closer. This brings up a very significant conundrum: You can’t tell people not to reproduce & you can’t kill people to preserve resources & space. Even at our current growth rate there’s[…]

FCC Proposes To Extend So-Called "Obamaphone" Program To Broadband

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 29, 2015

jfruh writes: The FCC’s Lifeline program subsidizes phone service for very poor Americans; it gained notoriety under the label “Obamaphone,” even though the program started under Reagan & was extended to cell phones under Clinton. Now the FCC is proposing that the program, which is funded by a fee on telecom providers, be extended to[…]

GoPro’s Next Adventure: Virtual Reality and Drones

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

stowie writes: Rumors have been swirling for some time that GoPro was developing a drone. Well, now it’s official. Speaking at the Code Conference, GoPro CEO Nick Woodman announced the company’s plans to come out with a quadcopter in the first half of 2016. Woodman said “the quad is in some ways the ultimate GoPro[…]

Live Anthrax Shipped Accidentally To S Korea and US Labs

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

New submitter hamsterz1 writes: U.S. Officials say that the military mistakenly sent live anthrax to laboratories in nine states & an air base in South Korea, after apparently failing to properly inactivate the bacteria. Four lab workers in the United States & up to 22 overseas have been given precautionary medical treatment. The CDC is[…]

Red Hat Security Advisory 2015-1036-01

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

Red Hat Security Advisory 2015-1036-01 – After May 29, 2015, as per the life-cycle support policy for Red Hat Satellite, Red Hat will discontinue technical support services as well as software maintenance services for all Red Hat Satellite versions 5.5 or older. View Source

Why Detecting Drones Is a Tough Gig

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

An anonymous reader writes with a link to some absorbing commentary at Help Net Security from Drone Lab CEO Zain Naboulsi approximately a security issue of a (so far) unusual kind: detecting drones whose masters are bent on malice. That’s relevant after the recent drone flight close enough to the White House to spook the[…]

IBM Cognos Business Intelligence Developer 10.2.1 Open Redirect

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

IBM Cognos Business Intelligence Developer version 10.2.1 suffers from an open redirect vulnerability. View Source

Murder Accusations Hang Over Silk Road Boss Ulbricht’s Sentencing

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

Patrick O’Neill writes: Ross Ulbricht has never been tried for murder yet tomorrow, when the convicted Silk Road creator is sentenced to prison, murder will be on the mind of the judge. Despite never filing murder for hire charges, New York federal prosecutors have repeatedly pushed for harsh sentencing because of, they told the judge,[…]

New Freescale I.MX6 SoCs Include IoT-focused UltraLite

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

DeviceGuru writes: Freescale has announced three new versions of its popular i.MX6 SoCs, including new DualPlus & QuadPlus parts featuring enhanced GPUs & expanded memory support, & a new low-end, IoT focused 528MHz UltraLite SoC that integrates a more power-efficient, single-core ARM Cortex-A7 architecture. The UltraLite, which will be available in a tiny 9x9mm package,[…]

Glowforge is a CNC Laser Cutter, not a 3D Printer (Video)

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

Co-Founder & CEO Dan Shapiro says, right at the beginning of the interview, that the Glowforge machine is a CNC laser cutter & engraver, not a 3-D Printer. He says they’ve “simplified the heck” out of the hardware & software, & are making an easy-to-use, non-costly ($2500 has been bandied approximately as the unit’s likely[…]

Android M Arrives In Q3: Native Fingerprint Support, Android Pay, ‘Doze’ Mode

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

MojoKid writes with yet more news from the ongoing Google IO conference: Google I/O kicked off this afternoon & the first topic of discussion was of course Google’s next generation mobile operating system. For those that were hoping for a huge UI overhaul or a ton of whiz-bang features, this is not the Android release[…]

Android M To Embrace USB Type-C and MIDI

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

jones_supa writes: USB Type-C connection is showing up in more & more devices, & Google is rolling support for the interface in its Android M operating system. The most significant additions relate to the USB Power Delivery spec. Charging will now work in both directions. That effectively means that Type-C devices can be used as[…]

Cloud Boom Drives Sales Boom For Physical Servers

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

jfruh writes: The promise of the cloud is that your storage & computing problems will be abstracted away from messy physical objects that you need to maintain, taken care of far way by other people. Well, it turns out that those other people need to buy a lot of servers. Read more of this story[…]

Neil DeGrasse Tyson Urges America To Challenge China To a Space Race

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

An anonymous reader writes: According to a Tuesday story in the UK edition of the International Business Times, Neil deGrasse Tyson, the celebrity astrophysicist & media personality, advocates a space race between the United States & China. The idea is that such a race would spur innovation & cause industry to grow. The Apollo race[…]

Black Hole Plays Pool With Plasma

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

the monolith writes: The Hubble Space Telescope is revealing that there is a pool game in progress, with a long shot being played out on a cosmic scale. It appears that the first recorded shot was observed in 1992, while subsequent canon shots were recorded between 1994 an 2014. In actuality, the shots are plasma,[…]

How a Scientist Fooled Millions With Bizarre Chocolate Diet Claims

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

__roo writes: Did you know chocolate helps you lose weight? You can read all approximately this tremendous news for chocoholics in the Daily Star, Daily Express, Irish Examiner, & TV shows in Texas & Australia, & even the front page of Bild, Europe’s largest daily newspaper. The problem is that it’s not true. A researcher[…]

Red Hat Security Advisory 2015-1035-01

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

Red Hat Security Advisory 2015-1035-01 – In accordance with the Red Hat Enterprise Linux Errata Support Policy, Extended Update Support for Red Hat Enterprise Linux 6.5 will be retired as of November 30, 2015, & support will no longer be provided. Accordingly, Red Hat will no longer provide updated packages, including Critical impact security patches[…]

A Tool For Analyzing H-1B Visa Applications Reveals Tech Salary Secrets

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

Tekla Perry writes: The golden age of engineers is not over,’ says a French software engineer who developed a tool for mining U.S. Department of Labor visa application data, but, he says, salaries appear to be leveling off. Indeed, salary inflation for software engineers & other technical professionals at Google & Facebook has slowed dramatically,[…]

How Tesla Batteries Will Force Home Wiring To Go Low Voltage

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

CIStud writes with a story at CEPro suggesting that solar power & home batteries like Tesla’s PowerWall “will force the reinvention of home wiring from primarily AC high voltage to DC home-run low voltage to reduce power conversion loss,” writing “To avoid the 20% to 40% power loss when converting from DC to AC, home[…]

New Technique To Develop Single-Molecule Diode

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

William Robinson writes: Under the direction of Latha Venkataraman, associate professor of applied physics at Columbia Engineering, researchers have designed a new technique to create a single-molecule diode, that has rectification ratio as high as 250, & ‘ON’ current as high as 0.1 microamps. The idea of creating a single-molecule diode was suggested by Arieh[…]

D-Link Bypass / Buffer Overflow

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

SEARCH-LAB performed an independent security assessment on four different D-Link devices. The assessment has identified altogether 53 unique vulnerabilities in the latest firmware (dated 30-07-2014). Several vulnerabilities can be abused by a remote attacker to execute arbitrary code & gain full control over the devices. View Source

US Justice Department Urges Supreme Court Not To Take Up Google v. Oracle

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

New submitter Areyoukiddingme writes: The Solicitor General of the Justice Department has filed a response to the US Supreme Court’s solicitation of advice regarding the Google vs. Oracle ruling & subsequent overturning by the Federal Circuit. The response recommends that the Federal Circuit ruling stand, allowing Oracle to retain copyright to the Java API. Read[…]

The Tricky Road Ahead For Android Gets Even Trickier

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

HughPickens.com writes: Farhad Manjoo writes in the NYT that with over one billion devices sold in 2014 Android is the most popular operating system in the world by far, yet that doesn’t mean it’s a financial success for Google. Apple vacuumed up nearly 90 percent of the profits in the smartphone business which prompts a[…]

The Tricky Road Ahead For Andriod Gets Even Trickier

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

HughPickens.com writes: Farhad Manjoo writes in the NYT that with over one billion devices sold in 2014 Android is the most popular operating system in the world by far, yet that doesn’t mean it’s a financial success for Google. Apple vacuumed up nearly 90 percent of the profits in the smartphone business which prompts a[…]

Red Hat Security Advisory 2015-1037-01

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

Red Hat Security Advisory 2015-1037-01 – After May 29, 2015, as per the life-cycle support policy for Red Hat Satellite Proxy, Red Hat will discontinue technical support services as well as software maintenance services for all Red Hat Satellite Proxy versions 5.5 or older. View Source

Ways To Travel Faster Than Light Without Violating Relativity

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

StartsWithABang writes: It’s one of the cardinal laws of physics & the underlying principle of Einstein’s relativity itself: the fact that there’s a universal speed limit to the motion of anything through space & time, the speed of light, or c. Light itself will always move at this speed (as well as certain other phenomena,[…]

IBM Lotus Domino 8.5.4 / 8.5.3 Cross Site Scripting

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

IBM Lotus Domino versions 8.5.3 & 8.5.4 suffer from a cross site scripting vulnerability. View Source

Gene Testing Often Gets It Wrong

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

BarbaraHudson writes: ABC is reporting that gene tests for risk of specific diseases are not as accurate as we’d like to think, with different labs giving different interpretations. Over 400 gene variants that could assist one make medical decisions regarding breast & ovarian cancer or heart disease have different interpretations from different labs according to[…]

High Court Orders UK ISPs To Block EBook Sites

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

An anonymous reader writes: The UK High Court has ordered British ISPs to block seven websites that assist users find unauthorized copies of eBooks. Under the order, BT, Virgin, Sky, EE & TalkTalk must block AvaxHome, Bookfi, Bookre, Ebookee, Freebookspot, Freshwap & LibGen within the next ten days. “We are very pleased that the High[…]

Ubuntu Security Notice USN-2617-3

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

Ubuntu Security Notice 2617-3 – USN-2617-1 fixed a vulnerability in NTFS-3G. The original patch did not completely address the issue. This update fixes the problem. Tavis Ormandy discovered that FUSE incorrectly filtered environment variables. A local attacker could use this issue to gain administrative privileges. Various other issues were moreover addressed. View Source

Red Hat Security Advisory 2015-1030-01

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

Red Hat Security Advisory 2015-1030-01 – The kernel packages contain the Linux kernel, the core of any Linux operating system. A use-after-free flaw was found in the way the Linux kernel’s SCTP implementation handled authentication key reference counting during INIT collisions. A remote attacker could use this flaw to crash the system or, potentially, escalate[…]

Red Hat Security Advisory 2015-1031-01

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

Red Hat Security Advisory 2015-1031-01 – KVM is a full virtualization solution for Linux on AMD64 & Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An out-of-bounds memory access flaw was found in the way QEMU’s virtual Floppy Disk Controller handled FIFO buffer access while processing certain[…]

Audacity 2.0.5 DLL Hijack

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

Audacity version 2.0.5 suffers from a dll hijacking vulnerability. View Source

Apache Cordova On Android Unintended Behavior

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

Android applications built with the Cordova framework that do not have explicit values set in Config.xml can have undefined configuration variables set by Intent. This can cause unwanted dialogs appearing in applications & changes in the application behavior that can include the app force-closing. Versions up to 4.0.1 are affected except for 3.7.2 View Source

Scientists Reverse Aging In Human Cell Lines

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

Eloking writes: Professor Jun-Ichi Hayashi from the University of Tsukuba in Japan has discovered the regulation of two genes involved with the production of glycine are partly responsible for some of the characteristics of aging. With this finding he has been able to “flip the switches on a few genes back to their youthful position,[…]

Thanks To the Montreal Protocol, We Avoided Severe Ozone Depletion

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

hypnosec writes: Scientists say the ozone layer is in satisfactory shape thanks to the Montreal Protocol, which has helped us avoid severe ozone depletion. Research suggests that the Antarctic ozone hole would have been 40% bigger by now if not for the international treaty. “Our research confirms the importance of the Montreal Protocol & shows[…]

Computer Chips Made of Wood Promise Greener Electronics

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 28, 2015

alphadogg writes: Researchers in the U.S. & China have developed semiconductor chips that are almost entirely made out of a wood-derived material. In addition to being biodegradable, the cost of production is much less than conventional semiconductors. According to the NetworkWorld report: “The researchers used a cellulose material for the substrate of the chip, which[…]

Global Business Leaders Say They Don’t Know Enough About Technology To Succeed

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

Lemeowski writes: New Harvard Business Review research finds that only 45% of business leaders surveyed say they personally have the technology knowledge they need to succeed in their jobs. What’s more, the survey of 436 global business leaders finds that only 23% are confident their organizations have the knowledge & skills to succeed in the[…]

Debian Security Advisory 3268-2

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

Debian Linux Security Advisory 3268-2 – The patch applied for ntfs-3g to fix CVE-2015-3202 in DSA 3268-1 was incomplete. This update corrects that problem. View Source

GM To Offer Apple CarPlay and Android Auto API In Most 2016 Vehicles

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

Lucas123 writes: GM today announced it will offer Apple CarPlay & Android Auto mirroring APIs on 14 of its 2016 vehicles. GM’s announcement follows one earlier this week by Hyundai, which said it would offer Android Auto in its Sonata Sedan this year. Some of GM’s Chevrolet vehicles — such as the Malibu, Camaro &[…]

SAP HANA Log Injection

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

Onapsis Security Advisory – Under certain conditions, the SAP HANA XS engine is vulnerable to arbitrary log injection, allowing remote authenticated attackers to write arbitrary information in log files. This could be used to corrupt log files or add fake content misleading an administrator. View Source

Making the World’s Largest Panoramic Photo

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

Iddo Genuth writes: In order to create the largest panoramic picture ever taken (using commercially available gear), a team of international photographers led by Italian photographer Filippo Blengini had to climb to an altitude of 3500 metres, wait for two weeks in a temperature of minus 10 degrees Celsius, look for a sunny, bright day,[…]

California Is Giving Away Free Solar Panels To Its Poorest Residents

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

MikeChino writes: Oakland-based non-profit GRID Alternatives is giving away 1,600 free solar panels to California’s poorest residents by the year 2016. The initiative was introduced by Senator Kevin de León & launched with funds gathered under the Greenhouse Gas Reduction Fund (GCRF), the state’s cap-and-trade program. SFGate reports: “Kianté London used the program to put[…]

The Marshall Islands, Nuclear Testing, and the NPT

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

Lasrick writes: Robert Alvarez, a senior scholar at the Institute for Policy Studies & a former senior policy adviser to the Energy Department’s secretary & deputy assistant secretary for national security & the environment, details the horrific consequences of nuclear weapons testing in the Marshall Islands & explains the lawsuits the Marshallese have filed against[…]

SAP HANA Information Disclosure

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

Onapsis Security Advisory – SAP HANA suffers from an information disclosure vulnerability via SQL IMPORT FROM statements. View Source

#1337day WP Fast Cache 1.4 CSRF Stored/Reflected XSS Vulnerability [webapps #exploits #Vulnerability #0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

View Source

hwclock Privilege Escalation

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

hwclock on Linux, when setuid, allows for local root-level privilege escalation. View Source

Microsoft Edge To Support Dolby Audio

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

jones_supa writes: Microsoft has revealed that its new Edge web browser will come with support for Dolby Audio in order to offer high-class audio when visiting websites. “It allows websites to match the compelling visuals of H.264 video with equally compelling multi-channel audio. It works well with AVC/H.264 video & moreover with our previously announced[…]

WordPress Free Counter 1.1 Cross Site Scripting

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

WordPress Free Counter plugin version 1.1 suffers from a cross site scripting vulnerability. View Source

#1337day WordPress Plugin Free Counter 1.1 Stored XSS Vulnerability CVE-2015-4084 [webapps #exploits #Vulnerability #0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

View Source

Adblock Plus Victorious Again In Court

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

New submitter Xochil writes: AdBlock Plus has successfully defended itself in court for the second time in five weeks. The Munich Regional Court ruled against media companies ProSiebenSat1 & IP Deutschland. The companies sued Eyeo, the company behind Adblock Plus, asking the court to ban the distribution of the free ad-blocking software, saying it hurts[…]

A Ph.D Thesis Defense Delayed By Injustice 77 Years

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

Taco Cowboy writes: A story approximately a 102-year old lady doing her PhD thesis defense is not that common, yet when the thesis defense was delayed by a whopping 77 years, that gotta raise some eyebrows. Ingeborg Syllm-Rapoport studied diphtheria at the University of Hamburg in Germany & in 1938, the 25-year old Protestant-raised, German-born[…]

Prospects and Limits For the LHC’s Capabilities To Test String Theory

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

StartsWithABang writes: The Large Hadron Collider has just been upgraded, & is now making the highest energy collisions of any human-made machine ever. But even at 13 TeV, what are the prospects for testing String Theory, considering that the string energy scale should be up at around 10^19 GeV or so? Surprisingly, there are a[…]

How Much C++ Should You Know For an Entry-Level C++ Job?

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

Nerval’s Lobster writes: How much C++ do you need to know to land an entry-level job that’s heavy in C++? That’s a question Dice posed to several developers. While the exact topic was C++, the broader question of “How much X do you actually need to know to make money off it?” could moreover apply[…]

DbNinja Flash 3.2.6 Cross Site Scripting

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

DbNinja Flash version 3.2.6 suffers from multiple cross site scripting vulnerabilities. View Source

Red Hat CEO Publishes Open Source Management Memoir

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

ectoman writes: Red Hat CEO Jim Whitehurst has just published The Open Organization, a book that chronicles his tenure as leader of the world’s largest open source company. The book aims to show other business leaders how open source principles like transparency, authenticity, access, & openness can enhance their organizations. It’s moreover filled with information[…]

Obama Asks Congress To Renew ‘Patriot Act’ Snooping

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

mi writes: President Obama has asked the Senate to renew key Patriot Act provisions before their expiration on May 31. This includes surveillance powers that let the government collect Americans’ phone records. Obama said, “It’s necessary to keep the American people safe & secure.” The call came despite recent revelations that the FBI is unable[…]

Heat Wave Kills More Than 1,100 In India

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

An anonymous reader sends word that a week-long heat wave in India has resulted in the deaths of more than 1,100 people. Temperatures reached 47C (117F) on Monday & are expected to stay dangerously high throughout the week. The heat & extreme dryness are being accompanied by strong westerly winds. “About one-third of the country’s[…]

SOPHOS WAF JSON Filter Bypass

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

SOPHOS WAF fails to mitigate SQL injection attacks leveraged via JSON. View Source

Thycotic Password Manager Secret Server MITM

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

Thycotic Password Manager Secret Server suffers from a man-in-the-middle SSL certificate verification vulnerability. View Source

Clinton Foundation: Kids’ Lack of CS Savvy Threatens the US Economy

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

theodp writes: As the press digs for details on Clinton Foundation donations, including a reported $26+ million from Microsoft & Bill Gates, it’s probably worth noting the interest the Clintons have developed in computer science & the role they have played — & continue to play — in the national K-12 CS & tech immigration[…]

WordPress WP Fast Cache 1.4 CSRF / Cross Site Scripting

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

WordPress WP Fast Cache plugin version 1.4 suffers from cross site request forgery & cross site scripting vulnerabilities. View Source

SpaceX Cleared For US Military Launches

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

An anonymous reader writes: The U.S. Air Force has given private rocket company SpaceX clearance to launch military satellites into orbit. This disrupts the lock that Boeing & Lockheed Martin have had on military launches for almost a decade. SpaceX will obtain its first opportunity to bid for such launches in June, when the Air[…]

A Text Message Can Crash An iPhone and Force It To Reboot

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

DavidGilbert99 writes with news that a bug in iOS has made it so anyone can crash an iPhone by simply sending it a text message containing certain characters. “When the text message is displayed by a banner alert or notification on the lockscreen, the system attempts to abbreviate the text with an ellipsis. If the[…]

Volvo Self-Parking Car Hits People Because Owner Didn’t Pay For Extra Feature

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

schwit1 writes: A video that recently went viral shows a demonstration of a Volvo XC60’s self-parking feature. It reverses itself, waits, & then confidently drives into a group of people at a non-negligible speed. (Two were hit, & while both were bruised, they were otherwise OK.) The situation was presumed to have resulted from a[…]

#1337day Clickheat 1.13+ Remote Command Execution Vulnerability [webapps #exploits #Vulnerability #0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

View Source

#1337day Apache Jackrabbit WebDAV XXE Exploit CVE: 2015-1833 [webapps #exploits #0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

View Source

#1337day Sendio ESP Information Disclosure Vulnerability CVE: 2014-0999 [webapps #exploits #Vulnerability #0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

View Source

#1337day WordPress Video Gallery Plugin 2.8 Arbitrary Mail Relay Vulnerability [webapps #exploits #Vulnerability #0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

View Source

#1337day Wordpess Simple Photo Gallery 1.7.8 Blind SQL Injection Vulnerability [webapps #exploits #Vulnerability #0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

View Source

#1337day WordPress church_admin Plugin 0.800 Stored XSS Vulnerability [webapps #exploits #Vulnerability #0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

View Source

Aruba ClearPass Policy Manager 6.4 Cross Site Scripting

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

Aruba ClearPass Policy Manager version 6.4 suffers from a stored cross site scripting vulnerability. View Source

Insurer Won’t Pay Out For Security Breach Because of Lax Security

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

chicksdaddy writes: In what may become a trend, an insurance company is denying a claim from a California healthcare provider following the leak of data on more than 32,000 patients. The insurer, Columbia Casualty, charges that Cottage Health System did an inadequate job of protecting patient data. In a complaint filed in U.S. District Court[…]

#1337day Unified-Layer Unrestricted File Upload (0day) [remote #exploits #0day #Exploit]

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

View Source

Ask Slashdot: Will Technology Disrupt the Song?

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

An anonymous reader writes: The music industry has gone through dramatic changes over the past thirty years. Virtually everything is different except the structure of the songs we listen to. Distribution methods have long influenced songwriting habits, from records to CDs to radio airplay. So will streaming services, through their business models, incentivize a alter[…]

How To Die On Mars

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

An anonymous reader writes: Many space-related projects are currently focusing on Mars. SpaceX wants to build a colony there, NASA is looking into base design, & Mars One is supposedly picking astronauts for a mission. Because of this, we’ve been reading a lot approximately how we could live on Mars. An article at Popular Science[…]

Supreme Court Rules In Favor of Patent Troll

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 27, 2015

An anonymous reader writes: The Supreme Court ruled today (PDF) that Cisco Systems can’t skip out of a patent suit against them from patent troll Commil USA. The case reached the Supreme Court because Cisco argued it had a “good faith belief” that the patent they were infringing was invalid. The justices voted 6-2 that[…]

Creationists Manipulating Search Results

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 26, 2015

reallocate writes: It looks like some Creationists are manipulating search results to ensure websites pushing religion are appearing in response to queries approximately science. Ask Google “What happened to the dinosaurs?” & you’ll see links to Creationist sites right at the top. (And, right now, several hits to sites taking note of it.) Google has[…]

Packet Fence 5.1.0

by w00t
Categories: New Vulnerabilities
Tags: No Tags
Comments: No Comments
Published on: May 26, 2015

PacketFence is a network access control (NAC) system. It is actively maintained & has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort[…]

Why PowerPoint Should Be Banned

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 26, 2015

An anonymous reader writes: An editorial at the Washington Post argues that Microsoft PowerPoint is being relied upon by too many to do too much, & we should start working to obtain rid of it. “Its slides are oversimplified, & bullet points omit the complexities of nearly any issue. The slides are designed to skip[…]

Mandriva Goes Out of Business

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 26, 2015

An anonymous reader writes: After struggling for the past several years, Mandriva has finally gone out of business, & is in the process of being liquidated. The company was responsible for Mandriva Linux, itself a combination of Mandrake Linux & Conectiva Linux. When Mandriva fell upon complex times, many of the distro’s developers migrated to[…]

Russian Space Agency Misused $1.8 Billion, May Be Replaced

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 26, 2015

An anonymous reader writes: After a pair of high profile launch failures in the past few months, Russian space agency Roscosmos is making headlines again: this time for corruption. A public spending watchdog reported that the organization had misused 92 billion rubles ($1.8 billion) in 2014 alone. Deputy Prime Minister Dmitry Rogozin said their space[…]

IRS: Personal Info of 100,000 Taxpayers Accessed Illegally

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 26, 2015

An anonymous reader writes: The Associated Press reports that an online service provided by the IRS was used to gather the personal information of more than 100,000 taxpayers. Criminals were able to scrape the “Get Transcript” system to acquire tax return information. They already had a significant amount of information approximately these taxpayers, though —[…]

Amtrak Installing Cameras To Watch Train Engineers

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 26, 2015

An anonymous reader writes: In the aftermath of the derailment of an Amtrak train in Philadelphia a couple weeks ago, the company has caved to demands that it install video cameras to monitor & record the actions of the engineers driving their trains. The National Transportation Safety Board has been recommending such cameras for the[…]

Microsoft Bringing Cortana To iOS, Android

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 26, 2015

An anonymous reader writes: While many huge tech companies have their own personal assistant software these days, few of them are available on a broad variety of devices. Microsoft has now announced that it’s becoming one of those few: Cortana will be available for iOS & Android devices after this year. It’s part of an[…]

Linux/Moose Worm Targets Routers, Modems, and Embedded Systems

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 26, 2015

An anonymous reader writes: Security firm ESET has published a report on new malware that targets Linux-based communication devices (modems, routers, & other internet-connected systems) to create a giant proxy network for manipulating social media. It’s moreover capable of hijacking DNS settings. The people controlling the system use it for selling “follows,” “likes,” & so[…]

Building Hospitable Open Source Communities (Video)

by w00t
Categories: The News
Tags: No Tags
Comments: No Comments
Published on: May 26, 2015

This is an 11 minute excerpt from an hour-long video, contributed by long-time Slashdot user Erik Möller. This video is the moving picture equivalent of the typical Slashdot summary of a text article, complete with a link to the main article, which in this case is a video (over an hour long) at PassionateVoices.org. Erik’s[…]

Tags
Last referers
Online Now
Welcome , today is Friday, May 29, 2015