Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment Re: I'm not surprised. (Score 2) 128

Speaking of politics, could somebody locate Ruth Bader Ginsburg's phone and see if it's at home, in the hospital, or already in the morgue. Inquiring minds would like to know.

You perhaps meant it as a joke. However, recently the NY Times posted a map of everywhere the mayor of NYC had traveled during the previous day, as a way of showing the risks of this technology. They did it by tracking an aide who travels everywhere with him.

Comment Re:I'm not surprised. (Score 4, Informative) 128

Bullshit.

You are not that important. Unless you are a criminal, on the run from the police, there are no bounty hunters looking for you.

Bounty hunters aren't the only potential users of this "service." How about abusive spouses? Stalkers? terrorists?

Comment Re:It's easy (Score 1) 162

I turn the radios OFF to conserve power. I need the power to log a 10h trip to a mountaintop and back. If the phone looks for wifi (or cell coverage) it depletes the batteries in 3h or so.

Absolute nonsense. WiFi uses no power when not connected. Yes, it looks for WiFi every 10 seconds or so, but that is a receiver only, and uses unmeasurably small amounts of energy. Cell coverage is a different story; if you don't have a connection it uses huge amounts of energy. The weaker the cell signals, the more energy.

Comment Re:Does turning off the device work? (Score 1) 162

You can turn it "off-ish".

Just wait until a plane "crashes-ish" from wireless interference.

Umm, where have you been for the past few years? Airlines now ENCOURAGE passengers to use WiFi on the plane, as part of their entertainment systems. And to access their overpriced in-flight Internet access. Up in the cockpit (where you would think there is a real chance of interference, if it wasn't a myth) the pilot and co-pilot use tablets (usually iPads) with WiFi connectivity on all the time. There never was an interference problem.

Submission + - US Republican Senate Committee hacked

pdclarry writes: While all of the recent news has been about hacking the Democratic party, apparently the Republicans have also been hacked, over many months (since March 2016). This was not about politics, however; it was to steal credit card numbers. Brian Krebs reports that; "a report this past week out of The Netherlands suggests Russian hackers have for the past six months been siphoning credit card data from visitors to the Web storefront of the National Republican Senatorial Committee (NRSC)." "If you purchased a “Never Hillary” poster or donated funds to the NRSC through its Web site between March 2016 and the first week of this month [October 2016], there’s an excellent chance that your payment card data was siphoned by malware and is now for sale in the cybercrime underground." Krebs says his information comes from Dutch researcher Willem De Groot, co-founder and head of security at Dutch e-commerce site byte.nl. The Republicans were not alone; theirs was just one of 5,900 e-commerce sites hacked by the same Russian actors.

Comment Re: What a Surprise (Score 1) 63

No that's called farming STDs.
These kids got off so easy, they made 600k in 2 years so it isn't hard to see how they made that whimsy 10k bond. And 30 day ban from the net. Just LOLs for these kids, now they have more street cred.

They haven't gotten off. They were arrested, posted bail, and had restrictions placed on them including the 30 day ban, lifting their passports and house arrest, presumably pending the next court appearance. There's more to come.

Submission + - Alleged proprietors of "DDOS for hire" service vDOS arrested

pdclarry writes: Brian Krebs reports that the two youthful (18 YO) alleged proprietors of vDOS, the DDOS service that was reported in Slashdot September 9, have been arrested in Israel on a complaint from the FBI. They have been released on $10,000 bond each, their passports lifted, and they have been placed under house arrest, and banned from using the Internet for 30 days. They were probably identified through a massive hack of the vDOS database recently.

Krebs also reports that vDOS's DNS addresses were hijacked by the firm BankConnect Security to get out from under a sustained DDOS attack, and that his site, krebsonsecurity.com has been under a sustained DDOS attack since his last article was published, with the packets containing the string "godiefaggot". Those attacks continue, but, as he has been the target of many DDOS attacks in the past, he covered by a DDOS protection firm.

Submission + - Krebs: Israeli DDOS provider 'vDOS' Earned $600,000 in Two Years (krebsonsecurity.com)

pdclarry writes: Brian Krebs (http://krebsonsecurity.com/) writes that he has obtained the hacked database of an Israeli company that is responsible for most of the large-scale DDOS attacks over the past (at least) 4 years. The vDOS database, obtained by KrebsOnSecurity.com at the end of July 2016, points to two young men in Israel as the principle owners and masterminds of the attack service, with support services coming from several young hackers in the United States. Records before 2012 were not in the dump, but Krebs believes that the service has actually been operating for decades..

Submission + - Apples Fixes Three Zero Days Used in Government Targeted Attack

Trailrunner7 writes: Apple has patched three critical vulnerabilities in iOS that were identified when an attacker targeted a human rights activist in the UAE with an exploit chain that used the bugs to attempt to remotely jailbreak and infect his iPhone.

The vulnerabilities include two kernel flaws and one in WebKit and Apple released iOS 9.3.5 to fix them. The attack that set off the investigation into the vulnerabilities targeted Ahmed Mansoor, an activist living in the UAE. Earlier this month, he received a text message that included a link to what was supposedly new information on human rights abuses. Suspicious, Manor forwarded the link to researchers at the University of Toronto’s Citizen Lab, who recognized what they were looking at.

“On August 10 and 11, 2016, Mansoor received SMS text messages on his iPhone promising “new secrets” about detainees tortured in UAE jails if he clicked on an included link. Instead of clicking, Mansoor sent the messages to Citizen Lab researchers. We recognized the links as belonging to an exploit infrastructure connected to NSO Group, an Israel-based ‘cyber war’ company that sells Pegasus, a government-exclusive “lawful intercept” spyware product,” Citizen Lab said in a new report on the attack and iOS flaws.

Slashdot Top Deals

Great spirits have always encountered violent opposition from mediocre minds. -- Albert Einstein

Working...