Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 101 declined, 16 accepted (117 total, 13.68% accepted)

Submission + - No javascript needed for new Adobe exploits (cnet.com)

bl8n8r writes: More woes for Adobe as security firm creates proof of concept attack which injects malicious code as part of the update process. The user only needs to click a dialog box to execute the code and no javascript is needed to launch the exploit. The exploit affects Foxit as well as Adobe Acrobat software. This exploit is made possible through the host software allowing execution of system binaries. Not clear if it's multiplatform, but seems plausible.
Windows

Submission + - Undetectable Trojan Still Going (theregister.co.uk) 1

bl8n8r writes: "Still going strong since 2006, this MBR infector has compromised more than a half-million financial accounts in less than three years. An HTML injection engine adds fields to login pages to compromise credentials. Injection is triggered by the web addresses. In all, the trojan has infected at least 300,000 Windows machines and stolen 270,000 online banking account numbers and 240,000 credit and debit credentials in less than three years."
Security

Submission + - Monster.com malware tags another site (usajobs.gov)

bl8n8r writes: "The first wave of problems for Monster.com came in the form of malware as recruiters clulessly pointed trojaned Windows systems into Monster's database. The incident reportedly gleaned more than 1.6 million records from the job search site's database. The second incident followed two days later in the form of an infected Monster.com server pharming out malware by way of advertisements hosted on it's websites. The latest incident now shows jobseekers using USAJobs are also at risk from the pharmed Monster trojan. The worst part is Monster.com seems to shrug it off with: "As is the case with many companies that maintain large databases of information, Monster is from time to time subject to illegal attempts to extract information from its database. Despite ongoing analysis, the scope of this illegal activity is impossible to pinpoint,". Given the obvious value of the Monster.com assets and most likely security implementations, why is this such a big problem? How can it be fixed?"
Portables

Submission + - Dell laptops still exploding (consumeraffairs.com)

bl8n8r writes: "It "looked like fireworks which would have been cool had it not been in my house." said Doug Brown of Columbus, Ohio. Brown, a Network Administrator, called 911 last week when the Dell 9200 laptop burst into flames in his house. Emergency response units included two pumpers, a ladder truck, a bamalance, the HAZMAT unit, and a battalion chief. When Doug phoned Dell to inquire about liability, he was asked if he had insurance. It's not clear if Doug's laptop is one of the earlier models recalled by Dell; a Macbook is cited in TFA for allegedly burning down a house in Australia as well as another instance of a suspect Dell laptop burning down a pickup truck in Nevada. If the burning battery issues are going to continue to be a problem, who's going to be responsible for losses? Insurance companies, Laptop makers, Battery vendors, and consumer negligence could presumably be cited in all cases."
United States

Submission + - Boeing gets contract for truck-mounted lasers guns (theregister.com) 1

bl8n8r writes: "Boeing has announced a contract with the United State's Army to develop laser cannons which are to be mounted atop trucks for the purpose shooting down incoming artillery, rockets, mortars or bombs. The High Energy Laser Technology Demonstrator (HELTD) project actually shoots stuff instead of just painting a mark on a target for other guidance systems. The intent is for shooting enemy projectiles out of the sky before they can reach their target, but I presume it could have other uses too."
Worms

Submission + - The Computer Virus Turns 25 in July 1

bl8n8r writes: In July of 1982, an infected Apple II propogated the first computer virus onto a 5-1/4" floppy. The virus, which did little more than annoy the user, Elk Cloner, was authored in Pittsburgh by a 15-year-old high school student, Rich Skrenta. The virus replicated by monitoring floppy disk activity and writing itself to the floppy when it was accessed. Skrenta describes the virus as "It was a practical joke combined with a hack. A wonderful hack." Remember, he was a 9th grader when he did this.
Education

Submission + - O'Reilly opens online technology school

bl8n8r writes: "The popular book author has started the O'Reilly School of Technology which offers online training and certification. "The O'Reilly School of Technology and the University of Illinois have partnered to offer Certificates of Professional Development in information technology and related skills." Hmong classes offered are Linux/Unix administration, Open Source coding, Java coding, C Programming and others."

Slashdot Top Deals

The bigger the theory the better.

Working...