×
Encryption

Quantum Key Exchange With an Airplane 44

submeta writes "Researchers in Munich have successfully performed a quantum key exchange between a moving aircraft and a ground station. Quantum key distribution, which exploits the phenomenon of entanglement, offers theoretically perfect encryption (although it can be vulnerable in practice). This advance is an important step on the way to key exchange with a satellite, which could enable practical usage of the technology."
Crime

Pirate Bay Co-Founder Detained In Sweden 95

wiredmikey writes "The co-founder of The Pirate Bay filesharing website was detained in Sweden on Friday, days after his deportation from Cambodia, officials said. Gottfrid Svartholm Warg, 27, faces a one-year prison sentence for promoting copyright infringement in his home country. His current detention is for an investigation into his involvement in the hacking of a Swedish IT firm named Logica. He was arrested in the Cambodian capital Phnom Penh on August 30 at Stockholm's behest and expelled late on Monday."
Privacy

Report Hints At Privacy Problem of Drones That Can Recognize Faces 107

New submitter inotrollyou writes "Drones are getting more sophisticated, and will soon carry 'soft' biometrics and facial recognition software. In other news, sales of hats, tinfoil, and laser pointers go up 150%. Obviously there are major privacy concerns and not everyone is down for this." It's not just drones, either: In my old neighborhood in Philadelphia the Orwellian police cameras were everywhere, and they're being touted as a solution for crime in my Texas neighborhood, too. The report itself is more predictive than proscriptive; under U.S. law, as the Register points out, you can expect less legal as well as practical privacy protection the further you are on the continuum between home and public space.
Networking

Intel Demos 7Gpbs Wireless Docking 52

Lucas123 writes "Intel for the first time demonstrated the Wireless Gigabit (WiGig) docking specification using an Ultrabook, which was able to achieve 7Gbps performance, ten times the fastest Wi-Fi networks based on the IEEE 802.11n standard. The WiGig medium access control (MAC) and physical (PHY) control specification operates in the unlicensed 60GHz frequency band, which has more spectrum available than the 2.4GHz and 5GHz bands used by existing Wi-Fi products. According to Ali Sadri, chairman of the WiGig Alliance, the specification also supports wireless implementations of HDMI and DisplayPort interfaces, as well as the High-Bandwidth Digital Content Protection (HDCP) scheme used to protect digital content transmitted over those interfaces. It scales to allow transmission of both compressed and uncompressed video."
Businesses

Google Kills Apps Support For Internet Explorer 8 296

An anonymous reader writes "Google today [Friday] announced it is discontinuing support for Internet Explorer 8 in Google Apps, including its Business, Education, and Government editions. The kill date is November 15, 2012. After that, IE8 users accessing Google Apps will see a message recommending that they upgrade their browser."
Businesses

Ask Slashdot: How To Prove IT Knowledge Without Expensive Certificates? 186

An anonymous reader writes "I'm starting my Ph.D in psychology this year and plan to finance this period with IT freelance work, mostly building websites with Drupal and setting up Linux networks, servers, etc.. Now I have a little problem: Since I never studied ICT nor followed a course that resulted in a certificate, I can only prove my knowledge by actually doing stuff or showing what I've done so far. Unfortunately that isn't always sufficient to convince potential customers. So I was wondering what other slashdotters do. Are there any free or cheap alternatives to get certificates or other more convincing ways to prove your IT knowledge?"
Privacy

Cameras To Watch Cameras In Maryland 297

Cornwallis writes in with a story reminding cameras everywhere that just because you're paranoid doesn't mean they aren't watching you. "Many people find speed cameras frustrating, and some in the region are taking their rage out on the cameras themselves. But now there's a new solution: cameras to watch the cameras. One is already in place, and Prince George's County Police Maj. Robert V. Liberati hopes to have up to a dozen more before the end of the year. 'It's not worth going to jail over a $40 ticket or an arson or destruction of property charge,' says Liberati."
Censorship

Why WikiLeaks' Spinoff OpenLeaks Failed 79

Sparrowvsrevolution writes "Wired has published an excerpt of the new WikiLeaks-related book This Machine Kills Secrets, which delves into the launch of the WikiLeaks spinoff OpenLeaks at the Chaos Communication Camp in Berlin last year. The detailed account of the site's debut, with German ex-WikiLeaker Daniel Domscheit-Berg at the helm, reveals that even before the dispute between WikiLeaks and OpenLeaks led to the controversial destruction of the decryption keys for 3,000 of WikiLeaks' encrypted leaks taken by Domscheit-Berg, OpenLeaks was already facing significant problems: Rumors that the group had been infiltrated by the German government, a lack of code open for public auditing and even a failure to get the site online in time for the penetration test it had invited the CCC hackers to perform. The book passage gives a peek into the infighting, bad luck, disorganization and personality problems that has left the world without a real sequel to WikiLeaks despite the dozens of leak-focused sites that have launched in the last two years."
Data Storage

WD Builds High-Capacity, Helium-Filled HDDs 356

Lucas123 writes "Western Digital subsidiary HGST today announced that after 10 years of development it is preparing to release 3.5-in data center-class HDDs that are hermetically sealed with helium inside. The helium reduces drag and wind turbulence created by the spinning platters, all but eliminating track misregistration that has become a major issue to increasing drive density in recent years. Because of that, HGST will be able to add two more platters along with increasing the tracks per inch, which results in a 40% capacity increase. The drives will also use 23% less power because of the reduction of friction on the spindle. HGST said the new seven-platter helium drives will weigh 29% less per terabyte of capacity that today's five-platter drives. In other words, a seven-platter helium disk will weigh 690 grams, the same as today's five-platter drives."
Botnet

Microsoft Disrupts Nitol Botnet 92

hypnosec writes "Having procured permission from the U.S. District Court for the Eastern District of Virginia, Microsoft's Digital Crimes Unit managed to disrupt more than 500 different strains of malware in a bid to slow down the threats posed by the Nitol botnet. Microsoft, through an operation codenamed b70 (PDF), discovered Chinese retailers were involved in selling computers with a pirated version of Windows loaded with malware. Microsoft believes the malware could have entered the supply chain at any point, for the simple reason that a computer travels among companies that transport and resell the computer. The Windows 8 maker carried out a study focused on the Nitol botnet, through which it found nearly 20 percent of all the PCs that were purchased through insecure Chinese supply chains were infected with malware."
Security

BMW Cars Vulnerable To Blank Key Attack 291

Techmeology writes "Thieves have discovered how to steal BMW cars produced since 2006 by using the onboard computer that is able to program blank keys. The device used — originally intended for use by garages — is able to reprogram the key to start the engine in around three minutes. The blank keys, and reprogramming devices, have made their way onto the black market and are available for purchase over the Internet."
The Almighty Buck

QR Codes As Anti-Forgery On Currency Could Infect Banks 289

New submitter planetzuda writes "Invisible nano QR codes have been proposed as a way to stop forgery of U.S. currency by students of the South Dakota School of Mines and Technology. Unfortunately QR codes are easy to forge and can send you to a site that infects your system. Banks would most likely need to scan currency that have QR codes to ensure the authenticity of the bill. If the QR code was forged it could infect the bank with a virus."
Security

Chip and Pin "Weakness" Exposed By Cambridge Researchers 133

another random user writes "A vulnerability in the widely used chip and pin payment system has been exposed by Cambridge University researchers. Cards were found to be open to a form of cloning, despite past assurances from banks that chip and pin could not be compromised. In a statement given to the BBC, a spokeswoman for the UK's Financial Fraud Action group said: 'We've never claimed that chip and pin is 100% secure and the industry has successfully adopted a multi-layered approach to detecting any newly-identified types of fraud.'"
Intel

Intel Demos McAfee Social Protection 183

MojoKid writes "During the Day Two keynote address at Intel Developer's Forum, Renee James, Senior Vice President and General Manager of Intel's Software & Services Group, talked about software development, security and services in an 'age of transparent computing.' During the security-centric portion of the keynote, James brought out a rep from Intel's McAfee division to show off a beta release of their McAfee Social Protection app. If you're unfamiliar, McAfee Social Protection is a soon to be released app and browser plug-in for Facebook that gives users the ability to securely share their photos. As it stands today, if you upload a photo to Facebook, anyone viewing that photo can simply download it or take a screen capture and alter or share it wherever they want, however they want. With McAfee Social Protection installed though, users viewing your images will not be able to copy or capture them. In quick testing, various attempts with utilities like Hypersnap, Snagit or a simple print screen operation to circumvent the technology only resulted in a black screen appearing in the grab. Poking around at browser image caches resulted in finding stored images that were watermarked with the McAfee Security logo."
Intel

Intel Confirms Decline of Server Giants 152

An anonymous reader writes "A Wired article discusses the relative decline of Dell, HP, and IBM in the server market over the past few years. Whereas those three companies once provided 75% of Intel's server chip revenue, those revenues are now split between the big three and five other companies as well. Google is fifth on the list. 'It's the big web players that are moving away from the HPs and the Dells, and most of these same companies offer large "cloud" services that let other businesses run their operations without purchasing servers in the first place. To be sure, as the market shifts, HP, Dell, and IBM are working to reinvent themselves. Dell, for instance, launched a new business unit dedicated to building custom gear for the big web players — Dell Data Center Services — and all these outfits are now offering their own cloud services. But the tide is against them.'"
Iphone

Apple Announces iPhone 5 1052

Today Phil Schiller took to the stage at the Yerba Buena Center for the Arts in San Francisco, where he announced the long-expected iPhone 5. The casing is made entirely of glass and aluminum, and it's 7.6mm thick, which is 18% thinner than the iPhone 4S. It weighs in at 112 grams, which is 20% lighter than the 4S. Schiller confirmed that the iPhone 5 has a 4" display, with a resolution of 1136x640. It's a 16:9 aspect ratio. The screen is the same width as a 4S, but it's taller. To accommodate older apps, they either center the app or add black bars to make it look right. The new device also has LTE support. Tim Cook spoke earlier about the iPad, making some interesting claims: "Yes, we are in a post-PC world." He also claimed 68% tablet market share for the iPad, and says iPads account for 91% of tablet-based web traffic. The event is continuing, and we'll update this post as further announcements appear. A real-time liveblog is being quickly updated at Ars Technica. Update: 09/12 18:16 GMT by S : Further details below.
Security

Malware Used in Aramco Attack Likely Work of Amateurs 18

wiredmikey writes with this excerpt from Security Week: "The Disttrack/Shamoon malware, while destructive, appears to be the work of amateurs and not elite and sophisticated developers, according to the latest analysis. The malware proved that it was possible for developers to subvert legitimate kernel-mode applications for malicious purposes, but it appears that the malware could have been even more destructive and dangerous, if it had not been for a series of programming mistakes in the code, according to recent analysis from Kaspersky Lab. Other suggestions that the developers behind the Shamoon malware are not high-profile programmers include that the command-and-control server is hard-coded as two addresses, which limits the tool since if the address ever changes, the infected machine can no longer receive instructions. The developers were most likely motivated by political reasons, as the malware overwrote existing files with a fragment of an image of a burning American flag. The Malware has also been reported to be linked to the recent Saudi Aramco attack, which some reports have suggested that insiders may have been partly involved. Saudi Aramco hasn't officially said what type of malware hit its systems."
Biotech

GAO Slams DHS Over BioWatch Biological Defense System 88

Mansing writes "Citizens need to evaluate if they are indeed safer for all the 'security precautions' put into place. 'The U.S. Department of Homeland Security has rushed to acquire a new, multibillion-dollar version of the BioWatch system for detecting biological attacks without establishing whether it was needed or would work, according to a new report by a nonpartisan investigative arm of Congress. ... The existing system's repeated false alarms have triggered tense, high-stakes deliberations over whether to order mass evacuations, distribute emergency medicines or shut down major venues.' Is this just more money funneled to U.S. companies, or is this really keeping the U.S. safer? Are the same types of 'security precautions' being instituted in Spain and the UK? Or is this preying on fear a uniquely U.S. phenomenon?"
Education

Is a Computer Science Degree Worth Getting Anymore? 630

snydeq writes "Self-taught technologists are almost always better hires than those with a bachelor's degree in computer science and a huge student loan, writes Andrew Oliver. 'A recruiter recently asked me why employers are so picky. I explained that of the people who earned a computer science degree, most don't know any theory and can't code. Instead, they succeed at putting things on their resume that match keywords. Plus, companies don't consider it their responsibility to provide training or mentoring. In fairness, that's because the scarcity of talent has created a mercenary culture: "Now that my employer paid me to learn a new skill, let me check to see if there's an ad for it on Dice or Craigslist with a higher rate of pay." When searching for talent, I've stopped relying on computer science degrees as an indicator of anything except a general interest in the field. Most schools suck at teaching theory and aren't great at Java instruction, either. Granted, they're not much better with any other language, but most of them teach Java.'"
Network

Go Daddy: Network Issues, Not Hacks Or DDoS, Caused Downtime 143

miller60 writes "GoDaddy says yesterday's downtime was caused by internal network problems that corrupted data in router tables. 'The service outage was not caused by external influences,' said Scott Wagner, Go Daddy's Interim CEO. 'It was not a 'hack' and it was not a denial of service attack (DDoS). ... At no time was any customer data at risk or were any of our systems compromised.' The outage lasted for at least six hours, and affected web sites and email for customers of the huge domain registrar."

Slashdot Top Deals