×
Android

Adventures In Rooting: Running Jelly Bean On Last Year's Kindle Fire 41

concealment writes "Luckily, the Fire's low price and popularity relative to other Android tablets has made it a common target for Android's bustling open-source community, which has automated most of the sometimes-messy process of rooting and flashing your tablet. The Kindle Fire Utility boils the whole rooting process down to a couple of steps, and from there it's pretty easy to find pretty-stable Jelly Bean ROMs. A CyanogenMod-based version is actively maintained, but I prefer the older Hashcode ROM, which is very similar to the interface on the Nexus 7."
United States

US Congress Rules Huawei a 'Security Threat' 186

dgharmon writes with the lead from a story in the Brisbane Time: "Chinese telecom company Huawei poses a security threat to the United States and should be barred from US contracts and acquisitions, a yearlong congressional investigation has concluded. A draft of a report by the House Intelligence Committee said Huawei and another Chinese telecom, ZTE, 'cannot be trusted' to be free of influence from Beijing and could be used to undermine U.S. security."
Networking

Take a Free Networking Class From Stanford 128

New submitter philip.levis writes "Nick McKeown and I are offering a free, online class on computer networking. We're professors of computer science and electrical engineering at Stanford and are also co-teaching Stanford's networking course this quarter. The free, online class will run about six weeks and is intended to be accessible to people who don't program: the prerequisites are an understanding of probability, bits and bytes, and how computers lay out memory. Given how important the Internet is, we think a more accessible course on the principles and practice of computer networks could be a very valuable educational resource. I'm sure many Slashdot readers will already know much of what we'll cover, but for those who don't, here's an opportunity to learn!"
Firefox

Mozilla To Bug Firefox Users With Old Adobe Reader, Flash, Silverlight 247

An anonymous reader writes "Mozilla today announced it will soon start prompting Firefox users to upgrade select old plugins. This will only affect Windows users, and three plugins: Adobe Reader, Adobe Flash, and Microsoft Silverlight. Mozilla says Firefox users will 'soon see a notification urging them to update' when they visit a web page that uses the plugins."
The Internet

Ad Group Says Internet Accounts For 5.1M US Jobs, 3.7% of GDP 73

lpress writes "A Harvard Business School study sponsored by the Interactive Advertising Bureau shows that the ad-supported Internet is responsible for 5.1 million jobs in the U.S. — two million direct and 3.1 million indirect. They report that the Internet accounted for 3.7% of 2011 GDP. The research, development and procurement that launched the Internet back in the 1970s and 1980s cost the US taxpayers $124.5 million at the time — not a bad investment!" Your calculations may vary.
Bug

Spreadsheet Blamed For UK Rail Bid Fiasco 125

First time accepted submitter Bruce66423 writes "As a sometime computer programmer who was always very sniffy about the quality of the stuff being knocked up by amateurs aka power users, the current claim that it was a messed up spreadsheet that caused a multi-million pound fiasco is very satisfying. 'The key mechanism... mixed up real and inflated financial figures and contained elements of double counting.'"
Crime

Wanted: Hackers For Large-Scale Attacks On American Banks 77

Trailrunner7 writes "RSA's FraudAction research team has been monitoring underground chatter and has put together various clues to deduce that a cybercrime gang is actively recruiting up to 100 botmasters to participate in a complicated man-in-the-middle hijacking scam using a variant of the proprietary Gozi Trojan. This is the first time a private cybercrime organization has recruited outsiders to participate in a financially motivated attack, said Mor Ahuvia, cybercrime communications specialist for RSA FraudAction. The attackers are promising their recruits a cut of the profits, and are requiring an initial investment in hardware and training in how to deploy the Gozi Prinimalka Trojan, Ahuvia added. Also, the gang will only share executable files with their partners, and will not give up the Trojan's compilers, keeping the recruits dependent on the gang for updates."
Android

Over 60% of Android Malware Hides In Fake Versions of Popular Apps 111

An anonymous reader writes "Like any popular platform, Android has malware. Google's mobile operating system is relatively new, however, so the problem is still taking form. In fact, it turns out that the larger majority of threats on Android come from a single malware family: Android.FakeInstaller, also known as OpFake, which generates revenue by silently sending expensive text messages in the background. McAfee says that the malware family makes up more than 60 percent of Android samples the company processes."
Transportation

Boston Airport Replacing X-ray Body Scanners 119

OverTheGeicoE writes "Boston's Logan International Airport is in the process of replacing its X-ray body scanners with millimeter-wave ones. According to the article, nine of the new scanners have been installed already, and ultimately 27 of these scanners will replace the 17 X-ray backscatter scanners that were installed in March of 2010. The new devices are 'being installed come with software that replaces "passenger-specific images" — or nearly naked views of travelers — with generic outlines that highlight only anomalies such as belts, jewelry, wallets — or guns or bombs.' Perhaps this will help TSA workers avoid being part of a cancer cluster. Some speculate that TSA will ultimately eliminate all of its X-ray body scanners."
Social Networks

Decentralized Social Networking — Why It Could Work 128

Slashdot contributor Bennett Haselton writes with "a response to some of the objections raised to my last article, about a design for a distributed social networking protocol, which would allow for decentralized (and censorship-resistant) hosting of social networking accounts, while supporting all of the same features as sites like Facebook." Social networking is no longer new; whether you consider it to have started with online communities in the mid-90s or with the beginnings of sites many people still use today. As its popularity has surged, it has grown in limited ways; modern social networks have made communication between users easier, but they've also made users easier to market to advertisers as well. There's no question that the future of social networking holds more changes that can both help and harm users — perhaps something like what Bennett suggests could serve to mitigate that harm. Read on for the rest of his thoughts.
Security

Hitachi Develops Boarding Gate With Built-In Explosives Detector 118

An anonymous reader writes "Hitachi, in collaboration with Nippon Signal and the University of Yamanashi, have successfully prototyped a boarding gate with built-in explosives detection equipment as part of efforts to increase safety in public facilities such as airports. The prototype boarding gate efficiently collects minute particles which have affixed themselves to IC cards or portable devices used as boarding passes, and can detect within 1-2 seconds the presence of explosive compounds using internalized equipment. With this method, it is possible to inspect 1,200 passengers per hour."
Security

Europe Joins Forces In Massive Simulated Cyber Attack 36

An anonymous reader writes "Hundreds of cyber security experts from across the EU are testing their readiness to combat cyber-attacks in a day-long simulation across Europe today. In Cyber Europe 2012, 400 experts from major financial institutions, telecoms companies, internet service providers and local and national governments across Europe are facing more than 1200 separate cyber incidents (including more than 30 000 emails) during a simulated DDoS campaign. The exercise is testing how they would respond and co-operate in the event of sustained attacks against the public websites and computer systems of major European banks. If real, such an attack would cause massive disruption for millions of citizens and businesses across Europe, and millions of euros of damage to the EU economy."
Oracle

Oracle's Sparc T5 Chip Evidently Pushed Back to 2013 98

Mark Hachman writes in Slash Datacenter that the Sparc T5 chip Oracle announced earlier this year apparently won't be ready until sometime in 2013. John Fowler, executive vice president, Systems, Oracle, presented at Oracle Open World a chart outlining highlights of Oracle's plans for the future. "But Fowler also skipped over some bad news: an apparent delay for the Sparc T5. A year ago, Oracle’s Sun division announced the Sparc T4—and according to Fowler, Oracle chief Larry Ellison set a very high bar for the next iteration: double the performance while maintaining app compatibility on an annual basis. Apparently, that didn’t quite happen with the T5; Oracle had the opportunity to announce a T5-based server, and didn’t. That’s a bit of bad news for the Sun design team, which already had to watch Intel’s Xeon chief, Diane Bryant, give the preceding keynote. ... As detailed at this year’s Hot Chips conference, the T5 combines 16 CPU cores running at 3.6 GHz on a 28-nm manufacturing process. Continuing the trend of hardware acceleration of specific functions, Sun executives claimed the chip would lead in on-chip encryption acceleration, with support for asymmetric (public key) encryption, symmetric encryption, hashing up to SHA-512, plus a hardware random number generator."
Open Source

Linux 3.7 Kernel To Support Multiple ARM Platforms 82

hypnosec writes with news that the Linux 3.7 kernel will support multiple ARM-based System on Chip platforms (Git commit page), writing "Up until now there has been a separate Linux kernel build for each of the ARM platforms or SoCs, which is one of the several problems when it comes to ARM based Linux. The merging of ARM multi-platform support into Linux 3.7 will put an end to this problem, enabling the new kernel to not only target multiple platforms but also be more in line with its x86 counterpart."
The Internet

IETF Starts Work On Next-Generation HTTP Standards 82

alphadogg writes "With an eye towards updating the Web to better accommodate complex and bandwidth-hungry applications, the Internet Engineering Task Force has started work on the next generation of HTTP, the underlying protocol for the Web. The HTTP Strict Transport Security (HSTS), is a security protocol designed to protect Internet users from hijacking. The HSTS is an opt-in security enhancement whereby web sites signal browsers to always communicate with it over a secure connection. If the user is using a browser that complies with HSTS policy, the browser will automatically switch to a secure version of the site, using 'https' without any intervention of the user. 'It's official: We're working on HTTP/2.0,' wrote IETF Hypertext Transfer Protocol working group chair Mark Nottingham, in a Twitter message late Tuesday."
Power

Bruce Perens: The Day I Blundered Into the Nuclear Facility 181

Bruce Perens writes "I found myself alone in a room, in front of a deep square or rectangular pool of impressively clear, still water. There was a pile of material at the bottom of the pool, and a blue glow of Cherenkov radiation in the water around it. To this day, I can't explain how an unsupervised kid could ever have gotten in there."
Android

Sandia Lab Fires Up 300,000 Virtual Android Devices To Test Out Security 39

coondoggie writes "Researchers with the Sandia National Laboratory have tied together 300,000 virtual Android-based devices in an effort to study the security and reliability of large smartphone networks. The Android project, dubbed MegaDroid, is carefully insulated from other networks at the Labs and the outside world, but can be built up into a realistic computing environment, the researchers stated."
Encryption

SHA-3 Winner Announced 100

An anonymous reader writes "The National Institute of Standards and Technology (NIST) has just announced the winner of the SHA-3 competition: Keccak, created by Guido Bertoni, Joan Daemen and Gilles Van Assche of STMicroelectronics and Michaël Peeters of NXP Semiconductors. 'Keccak has the added advantage of not being vulnerable in the same ways SHA-2 might be,' says NIST computer security expert Tim Polk. 'An attack that could work on SHA-2 most likely would not work on Keccak because the two algorithms are designed so differently.' For Joan Daemen it must be a 'two in a row' feeling, since he also is one of the authors of AES."
Security

Graphics Cards: the Future of Online Authentication? 178

Gunkerty Jeb writes "Researchers working on the 'physically unclonable functions found in standard PC components (PUFFIN) project' announced last week that widely used graphics processors could be the next step in online authentication. The project seeks to find uniquely identifiable characteristics of hardware in common computers, mobile devices, laptops and consumer electronics. The researchers realized that apparently identical graphics processors are actually different in subtle, unforgeable ways. A piece of software developed by the researchers is capable of discerning these fine differences. The order of magnitude of these differences is so minute, in fact, that manufacturing equipment is incapable of manipulating or replicating them. Thus, the fine-grained manufacturing differences can act as a sort of a key to reliably distinguish each of the processors from one another. The implication of this discovery is that such differences can be used as physically unclonable features to securely link the graphics cards, and by extension, the computers in which they reside and the persons using them, to specific online accounts."
China

White House Confirms Chinese Cyberattack 212

New submitter clam666 writes "White House sources partly confirmed that U.S. government computers — reportedly including systems used by the military for nuclear commands — were breached by Chinese hackers. From the article: 'The attempted hack used 'spear phishing,' in which an attacker sends an email to a specific target that uses familiar phrases in hopes that the recipient will follow links or download attachments that unleash the hacker's malware. None of the White House's secure, classified computer systems were affected, said the official, who reached out to POLITICO after the Free Beacon story appeared — without having been asked for comment. Nor had there been any attempted breach of a classified system, according to the official.'"

Slashdot Top Deals