×
IBM

IBM Optical Chip Moves Data At 1Tbps 127

snydeq writes "IBM researchers have developed a prototype optical chip that can transfer data at 1Tbps, the equivalent of downloading 500 high-definition movies, using light pulses, the company said Thursday. The chip, called Holey Optochip, is a parallel optical transceiver consisting of both a transmitter and a receiver, and is designed to handle the large amount of data created and transmitted over corporate and consumer networks as a result of new applications and services. It is expected to power future supercomputer and data center applications, an area where IBM already uses optical technology." User judgecorp links to more coverage, writing "The record was achieved because 24 holes in the chip allow direct access to lasers connected to the chip."
GNOME

Data Breach Flaw Found In Gnome-terminal, Xfce Terminal and Terminator 184

suso writes "A design flaw in the VTE library was published this week. The VTE library provides the terminal widget and manages the scrollback buffer in many popular terminal emulators including gnome-terminal, xfce4-terminal, terminator and guake. Due to this flaw, your scrollback buffer ends up on your /tmp filesystem over time and can be viewed by anyone who gets ahold of your hard drive. Including data passed back through an SSH connection. A demonstration video was also made to make the problem more obvious. Anyone using these terminals or others based on libVTE should be aware of this issue as it even writes data passed back through an SSH connection to your local disk. Instructions are also included for how to properly deal with the leaked data on your hard drive. You are either encouraged to switch terminals and/or start using tmpfs for your /tmp partition until the library is fixed."
Education

Raspberry Pi Production Delayed By Factory's Assembly Flub 132

nk497 writes "The first shipment of Raspberry Pi devices has been delayed, after the factory manufacturing the cheap educational computer used non-magnetic jacks instead of ones with integrated magnetics. The problem is already nearly fixed, but new jacks need to be sourced for subsequent shipments, so those could be delayed slightly. 'It's inevitable, isn't it — you're freewheeling along perfectly happily and then you get a puncture,' said spokeswoman Liz Upton, apologizing for the delay."
Chrome

Chrome Hacked In 5 Minutes At Pwn2Own 169

Skuto writes "After offering a total prize fund of up to $1M for a successful Chrome hack, it seems Google got what it wanted (or not!). No more than 5 minutes into the Pwn2Own cracking contest team Vupen exploited 2 Chrome bugs to demonstrate a total break of Google's browser. They will win at least 60k USD out of Google's prize fund, as well as taking a strong option on winning the overall Pwn2Own prize. It also illustrates that Chrome's much lauded sandboxing is not a silver bullet for browser security."
Security

Researchers Seek Help In Solving DuQu Mystery Language 131

An anonymous reader writes "DuQu, the malicious code that followed in the wake of the infamous Stuxnet code, has been analyzed nearly as much as its predecessor. But one part of the code remains a mystery, and researchers are asking programmers for help in solving it. The mystery concerns an essential component of the malware that communicates with command-and-control servers and has the ability to download additional payload modules and execute them on infected machines."
Handhelds

Apple Unveils New iPad 989

adeelarshad82 writes "As expected, Apple announced the new iPad complete with a Retina Display, quad-core processor, 4G LTE, and an improved camera. The new iPad will run the rumored A5X processor, which according to Apple will provide four times the performance of the Tegra 3. The revamped tablet will also include a 2048-by-1536 display, apparently the most in any mobile device. And finally with 4G LTE, the new iPad will provide up to 73 Mbps download speeds; partners for which include Verizon, Rogers, Bell, Telus, and AT&T."
Security

Details Of FBI Surveillance In Lulzsec Takedown Emerge 278

uigrad_2000 writes "Yesterday, we learned that one of the top members of LulzSec (Sabu) had been an FBI informant for almost 6 months, and that this confidant of the LulzSec leader 'anarchaos' had given the feds what they needed to take him down. More details have come out now, completing a picture of how the sting took place from start to finish. It turns out that even the server space given from Sabu to anarchaos storing the details of 30,000 credit cards (from the Stratfor hack) had been funded by the FBI."
Security

Anonymous Defaces Panda Security Site 80

An anonymous reader writes "Surviving members of anonymous and/or lulzsec have hacked Panda Security's systems and defaced their site. Looks like revenge is coming back." El Reg has screenshots of the defacement. Panda Security says the intruders only managed to exploit the web server and did not compromise their internal networks.
Security

30K WordPress Blogs Infected With the Latest Malware Scam 104

alphadogg writes with an excerpt from an article over at Network World: "Almost 30,000 WordPress blogs have been infected in a new wave of attacks orchestrated by a cybercriminal gang whose primary goal is to distribute rogue antivirus software, researchers from security firm Websense say. The attacks have resulted in over 200,000 infected pages that redirect users to websites displaying fake antivirus scans. The latest compromises are part of a rogue antivirus distribution campaign that has been going on for months, the Websense researchers said."
Privacy

The Ineffectiveness of TSA Body Scanners 494

TheNextCorner points out a video that lays bare a glaring flaw in the TSA body scanners used in airports to detect weapons and explosives. In such scans, citizens are depicted in light colors, while metallic objects show as very dark. The problem comes when you consider that the images are taken with a dark background. From the transcript: "Yes that’s right, if you have a metallic object on your side, it will be the same color as the background and therefore completely invisible to both visual and automated inspection. It can’t possibly be that easy to beat the TSA’s billion dollar fleet of nude body scanners, right? The TSA can’t be that stupid, can they? Unfortunately, they can, and they are. To put it to the test, I bought a sewing kit from the dollar store, broke out my 8th grade home ec skills, and sewed a pocket directly on the side of a shirt. Then I took a random metallic object, in this case a heavy metal carrying case that would easily alarm any of the “old” metal detectors, and walked through a backscatter x-ray at Fort Lauderdale-Hollywood International Airport. On video, of course. While I’m not about to win any videography awards for my hidden camera footage, you can watch as I walk through the security line with the metal object in my new side pocket."
Cloud

Gate One Brings Text-mode Surfing To the Web, Quake-Style 71

Riskable writes "As a follow-up to my previous Slashdot story, Gate One is now out of beta. Packages can be downloaded here. There's also a live demo: press the ESC key on this page to have a terminal running lynx drop into view, Quake-style! I've also posted a video overview and the documentation can be found here. Some pertinent changes since the beta: Added the ability display images inline within terminals, key-based SSH authentication, a WebSockets authentication API (for secure embedding), dramatically improved terminal emulation, an overhauled bookmark manager, support for international keyboard layouts, and a web-based log viewer that lets you export logs to self-contained HTML playback files."
Security

20th Anniversary of Michelangelo Virus Scare 92

An anonymous reader writes "It's twenty years since the first big virus scare. According to security blogger Graham Cluley, who has written up his memories of the hard disk wiping virus, John McAfee predicted that around 5 million computers would be zapped by the virus on March 6th 1992. Of course, the truth was nothing like as bad — but the antivirus business was plagued forevermore by accusations of fear-mongering."
AMD

AMD Confirms CPU Bug Found By DragonFly BSD's Matt Dillon 292

An anonymous reader writes "Matt Dillon of DragonFly BSD just announced that AMD confirmed a CPU bug he found. Matt quotes part of the mail exchange and it looks like 'consecutive back-to-back pops and (near) return instructions can create a condition where the processor incorrectly updates the stack pointer.' The specific manifestations in DragonFly were random segmentation faults under heavy load."
The Internet

Building a Case For Telecommuting 230

Esther Schindler writes "Many of us geeks prefer to work at home without distractions, but a lot of bosses still believe that if they don't see you, you must be lolling about, eating bon-bons and playing Angry Birds. 'There may be many reasons a manager is distrustful of telecommuting but the phenomenon of what Albiero calls "presentism"—that is, only trusting and rewarding the folks you see at their computer is a major factor.' So it may be of some use to read through the research compiled by Diann Daniel that says telecommuting creates happier and more productive employees (which naturally include fewer distractions and better work-life balance), and an accompanying infographic showing the environmental benefits from reduced commuting. She follows it up with suggestions on how managers can mentor and support teleworkers. Some of this is general advice, but some of the tips are more specific: 'It may seem like a lot more work—all this up-front addressing of communication issues that happen far more naturally in the office—but the upside is increased efficiency. Albiero sees this especially in the area of meetings. He speaks of one client who has now instituted a meeting format that is structured to allow for the first five minutes of all meetings to be "small-talk minutes." Thus, everyone knows they needn't call in for those minutes unless they want to join."
Businesses

Cloud To Create 14 Million Jobs? Not So Much 264

jfruh writes "Did you hear about the study from Microsoft and IDC (PDF), declaring that adoption of cloud technologies would create 14 million jobs? Well, don't believe the hype. The study posts that, once small and medium business can use cloud products to just eliminate their IT department, they'll use those savings to hire people for their core business. It's a dubious proposition, and one that wouldn't be good news for IT workers even if things do play out that way."
Music

Hackers Nab Unreleased Michael Jackson Tracks From Sony 192

wiredmikey writes "Sony once again has found itself in the news surrounding another hacking-related incident. This time around, the breach doesn't appear to involve any lost user data or customer accounts, but instead, some valuable property owned by the record company. Today, several British news outlets have reported that more than 50,000 music tracks have been illegally accessed and downloaded by hackers, including a large number from the late Michael Jackson. Sony bought the catalog from Jackson's estate for $250 million in 2010, giving the company distribution rights to the unreleased music. The attack reportedly occurred shortly after details of the massive PlayStation Network breach last April, but details were only revealed this past weekend."
Security

GitHub Hacked 202

MrSeb writes "Over the weekend, developer Egor Homakov exploited a gaping vulnerability in GitHub that allowed him (or anyone else with basic hacker know-how) to gain administrator access to projects such as Ruby on Rails, Linux, and millions of others. GitHub uses the Ruby on Rails application framework, and Rails has been weak to what's known as a mass-assignment vulnerability for years. Basically, Homakov exploited this vulnerability to add his public key to the Rails project on GitHub, which then meant that GitHub identified him as an administrator of the project. From here, he could effectively do anything, including deleting the entire project from the web; instead, he posted a fairly comical commit. GitHub summarily suspended Homakov, fixed the hole, and, after 'reviewing his activity,' he has been reinstated. Homakov could've gained administrative access to the master branch of any project on GitHub and deleted the history, committed junk, or closed or opened tracker tickets."
Security

Video Video Captchas are Hard for Computers to Understand but Easy for Humans (Video) Screenshot-sm 128

A new company called NuCaptcha provides animated video captchas it says are much harder for OCR-based programs to crack than static captchas, but lots easier for humans to figure out. While at the 2012 RSA conference, Timothy Lord pointed his camcorder at NuCaptcha CTO Christopher Bailey, and had him explain how video captchas work and how the company makes money. The video includes demos of the video captchas so you can see what they look like (and the company's website has lots more video captcha examples).
Security

Ask Slashdot: Using Company Laptop For Personal Use 671

An anonymous reader writes "I'm starting a new job soon, and I will be issued a work laptop. For obvious reasons I cannot name any names, but I can state that I do expect my employer to have tracking software on the laptop, and I expect to not be the administrator on the device. That being said, I am not the kind of person who can just 'not browse the internet.' If I ever have to travel with this laptop, I may want to read an ebook or watch a movie or maybe even play a game. I can make an image of the drive, then wipe the machine, and restore it back to its former state if I ever have to return it. I can use portable apps off a usb key and browse in private mode. The machine will be encrypted, but I can also make myself my own little encrypted folder or partition perhaps. Are there any other precautions I could or should take?"
Encryption

Anonymous, Decentralized and Uncensored File-Sharing Is Booming 308

PatPending writes with this excerpt from TorrentFreak: "The RetroShare network allows people to create a private and encrypted file-sharing network. Users add friends by exchanging PGP certificates with people they trust. All the communication is encrypted using OpenSSL and files that are downloaded from strangers always go through a trusted friend. In other words, it's a true Darknet and virtually impossible to monitor by outsiders. RetroShare founder DrBob told us that while the software has been around since 2006, all of a sudden there's been a surge in downloads. 'The interest in RetroShare has massively shot up over the last two months,' he said."

Slashdot Top Deals