By EditorDavid from Slashdot's hole-in-the-host department
An anonymous IT geek writes:
Cloudflare-hosted web sites have been leaking data as far back as September, according to Gizmodo, which reports that at least Cloudflare "acted fast" when the leak was discovered, closing the hole within 44 minutes, and working with search engines to purge their caches. (Though apparently some of it is still lingering...) Cloudflare CEO Matthew Prince "claims that there was no detectable uptick in requests to Cloudflare-powered websites from September of last year...until today. That means the company is fairly confident hackers didn't discover the vulnerability before Google's researchers did."
And the company's CTO also told Reuters that "We've seen absolutely no evidence that this has been exploited. It's very unlikely that someone has got this information... We do not know of anybody who has had a security problem as a result of this." Nevertheless, Fortune warns that "So many sites were vulnerable that it doesn't make sense to review the list and change passwords on a case-by-case basis." Some sites are now even resetting every user's password as a precaution, while site operators "are also being advised to wipe their sites' cookies and security certificates, and perform their own web searches to see if site data leaked." But I'd like to know what security precautions are being taken by Slashdot's readers?
Leave your own answers in the comments. How did you respond to Cloudbleed?Read Replies (0)
By EditorDavid from Slashdot's cognitive-Captain-Falcon department
"The AI is definitely godlike," one professional player told Quartz. "I am not sure if anyone could beat it." An anonymous reader quotes their report about an AI's showdown with the best players of Super Smash Bros. Melee:
Of 10 professionals that faced the bot, each one was killed more than they could kill the bot... But the bot was once only as good as a mere mortal. At first, Vlad Firoiu, creator and a competitive Smash player himself, couldn't train 'Phillip' to be as strong as the in-game bot, which he says even the worst players can beat fairly easily. Firoiu's solution? He started making the bot play itself over and over again, slowly learning which techniques fail and which succeed, called reinforcement learning. Then, he left it alone.
"I just sort of forgot about it for a week," said Firoiu, who coauthored an unreviewed paper with William F. Whitney, the NYU student [who helped him] on the work. "A week later I looked at it and I was just like, 'Oh my gosh.' I tried playing it and I couldn't beat it."
Business Insider points out that their AI read the players positions, velocities, and states directly from the game's memory, so the AI responds six times faster than a human player. To compensate it played as Captain Falcon, the game's slowest character, but there was one crucial glitch. "One particularly clever player found that the simple strategy of crouching at the edge of the stage caused the network to behave very oddly, refusing to attack and eventually KOing itself by falling off the other side of the stage."Read Replies (0)
By EditorDavid from Slashdot's hashing-things-out department
Google's researchers specifically cited Git when they announced a new SHA-1 attack vector, according to ZDNet. "The researchers highlight that Linus Torvald's code version-control system Git 'strongly relies on SHA-1' for checking the integrity of file objects and commits. It is essentially possible to create two Git repositories with the same head commit hash and different contents, say, a benign source code and a backdoored one,' they note." Saturday morning, Linus responded:
First off - the sky isn't falling. There's a big difference between using a cryptographic hash for things like security signing, and using one for generating a "content identifier" for a content-addressable system like git. Secondly, the nature of this particular SHA1 attack means that it's actually pretty easy to mitigate against, and there's already been two sets of patches posted for that mitigation. And finally, there's actually a reasonably straightforward transition to some other hash that won't break the world - or even old git repositories...
< article continued at Slashdot's hashing-things-out department
>Read Replies (0)
By EditorDavid from Slashdot's killed-in-Kansas department
Garmin engineer Srinivas Kuchibhotla was shot and killed at a local bar in Olathe, Kansas, the U.S. headquarters of Garmin. Co-worker Alok Madasani was also injured along with bystander Ian Grillot, who attempted to help the men. "The suspect in the shooting, Adam Purinton, was drinking at the bar in Olathe, Kansas, at about 7:15 p.m. that night," reports The Verge. "A witness said he yelled 'get out of my country' to two of the victims, reportedly saying the men, believed to originally be from India, were 'Middle Eastern.'" In 2015, Garmin employed 2,700 workers in Olathe and has plans to double this number, which the article notes has led to "increasing diversity" in the community.Read Replies (0)
By EditorDavid from Slashdot's unauthorized-flying-objects department
Between February and September of 2016, there were 1,274 reports of drones near airports -- versus just 874 for the same period in 2015, according to newly-released FAA research. "The report detailed more than 1,200 incidents of airplane pilots, law enforcement, air traffic controllers, and U.S. citizens reporting drones flying in places they shouldn't," writes Fortune. An anonymous reader quotes their report:
One of takeaway of the report was that while the FAA has received several reports from pilots that drones may have hit their aircraft, the administration was unable to verify any such claim. "Every investigation has found the reported collisions were either birds, impact with other items such as wires and posts, or structural failure not related to colliding with an unmanned aircraft," the FAA said in a statement... Although a drone hasn't smashed into an airplane yet, the FAA "wants to send a clear message that operating drones around airplanes and helicopters is dangerous and illegal. Unauthorized operators may be subject to stiff fines and criminal charges, including possible jail time," the FAA said.Read Replies (0)
By EditorDavid from Slashdot's persistent-popups department
This severe flaw in the browser security model affects only Internet Explorer 11, which unfortunately is the second most used browser version, after Chrome 55, with a market share of over 10%. Even worse for IE11 users, there's no fix available for this issue because the researcher has decided to stop reporting bugs to Microsoft after they've ignored many of his previous reports. For IE11 users, a demo page is available here.Read Replies (0)
By EditorDavid from Slashdot's Mario-where-are-you? department
A project to preserve (and validate) every Super Nintendo game ROM had been derailed when the post office lost a package containing 100 games from the PAL region. But now Byuu, the creator of the Higan SNES emulator, reports that the package has been found. An anonymous reader writes:
Thursday Byuu finally posted photos of the unboxing for the package that was shipped to him January 5th. "I'd like to offer my sincerest apologies to the USPS for assuming the worst in that these games were stolen. I should not have been so hasty to assume malicious intent." At the same time, Byuu writes that "My package was sitting in Atlanta, GA for well over a month with my address clearly visible right on the box. Had this case not been escalated to the media, it likely would have gone up for auction in a bin with other electronics sometime in March."
Byuu is now refunding donations he'd received to replace the missing games, and says he can now also resume work on the SNES Preservation Project.
And going forward, according to Eurogamer, "Byuu has said he will be more cautious with shipping games in the future -- only using smaller shipments, or buying individual games to scan and archive then selling them on to get some money back."Read Replies (0)
By EditorDavid from Slashdot's grey-areas department
An anonymous reader writes:
"Chats that seem to be more ephemeral than email are still being recorded on a server somewhere," reports Fast Company, noting that Slack's Data Request Policy says the company will turn over data from customers when "it is compelled by law to do so or is subject to a valid and binding order of a governmental or regulatory body...or in cases of emergency to avoid death or physical harm to individuals." Slack will notify customers before disclosure "unless Slack is prohibited from doing so," or if the data is associated with "illegal conduct or risk of harm to people or property."
The article also warns that like HipChat and Campfire, Slack "is encrypted only at rest and in transit," though a Slack spokesperson says they "may evaluate" end-to-end encryption at some point in the future. Slack has no plans to offer local hosting of Slack data, but if employers pay for a Plus Plan, they're able to access private conversations.
Though Slack has 4 million users, the article points out that there's other alternatives like Semaphor and open source choices like Wickr and Mattermost. I'd be curious to hear what Slashdot readers are using at their own workplaces -- and how they feel about the privacy and security of Slack?Read Replies (0)
By EditorDavid from Slashdot's parsing-problems department
"The Java and Python runtimes fail to properly validate FTP URLs, which can potentially allow attackers to punch holes through firewalls to access local networks," reports CSO Online. itwbennett writes: Last weekend security researcher Alexander Klink disclosed an interesting attack where exploiting an XML External Entity vulnerability in a Java application can be used to send emails. At the same time, he showed that this type of vulnerability can be used to trick the Java runtime to initiate FTP connections to remote servers. After seeing Klink's exploit, Timothy Morgan, a researcher with Blindspot Security, decided to disclose a similar attack that works against both Java's and Python's FTP implementations. "But his attack is more serious because it can be used to punch holes through firewalls," writes Lucian Constantin in CSO Online. "The Java and Python developers have been notified of this problem, but until they fix their FTP client implementations, the researcher advises firewall vendors to disable classic mode FTP translation by default..." reports CSO Online. "It turns out that the built-in implementation of the FTP client in Java doesn't filter out special carriage return and line feed characters from URLs and actually interprets them. By inserting such characters in the user or password portions of an FTP URL, the Java FTP client can be tricked to execute rogue commands..."Read Replies (0)
By BeauHD from Slashdot's time-to-jump-ship department
An anonymous reader quotes a report from AppleInsider: A U.S. Securities and Exchange Commission filing on Friday reveals Apple board member Al Gore this week sold 215,437 shares of Apple stock (APPL) worth about $29.5 million. Gore's stock sale, which was accomplished in multiple trades ranging from $136.4 to $137.12 on Wednesday, nearly matches a $29.6 million purchase of Apple shares made in 2013. When Gore bought the stock batch more than four years ago, he exercised Apple's director stock option to acquire 59,000 shares at a price of about $7.48 per share, costing him approximately $441,000. This was pre-split AAPL, so shares were valued at $502.68 each. Following today's sale, Gore owns 230,137 shares of Apple stock worth $31.5 million at the end of trading on Friday.Read Replies (0)
By BeauHD from Slashdot's insect-intelligence department
Clint Perry, a biologist who studies the evolution of cognition in insects at Queen Mary University of London, and his colleagues have released the results of a creative new experiment in which they essentially taught bumblebees how to play "bee soccer." "The insects' ability to grasp this novel task is a big score for insect intelligence, demonstrating that they're even more complex thinkers than we thought," reports Smithsonian. From the report: For the study, published in the February 23 issue of Science, researchers gave a group of bees a novel goal (literally): to move a ball about half their size into a designated target area. The idea was to present them with a task that they would never have encountered in nature. Not only did the bees succeed at this challenge -- earning them a sugary treat -- but they astonished researchers by figuring out how to meet their new goal in several different ways. Some bees succeeded at getting their ball into the goal with no demonstration at all, or by first watching the ball move on its own. But the ones that watched other bees successfully complete the game learned to play more quickly and easily. Most impressively, the insects didn't simply copy each other -- they watched their companions do it, then figured out on their own how to accomplish the task even more efficiently using their own techniques. The results show that bees can master complex, social behaviors without any prior experience -- which could be a boon in a world where they face vast ecological changes and pressures.Read Replies (0)
By BeauHD from Slashdot's stop-dead-in-your-tracks department
ZeniMax, the parent company of Fallout and Skyrim developer Bethesda, has filed for an injunction against virtual-reality company Oculus over the recent stolen technology case. The company had accused Oculus of stealing VR-related code, and was subsequently awarded $500 million by a Dallas court earlier this month. ZeniMax has now filed additional papers against Oculus, requesting that Oculus' products using the stolen code be removed from sale. GameSpot reports: Specifically, ZeniMax is seeking to block sales of its mobile and PC developer kits, as well as technology allowing the integration of Oculus Rift with development engines Unreal and Unity, reports Law360. If the injunction isn't granted, ZeniMax wants a share of "revenues derived from products incorporating its intellectual properties," suggesting a 20 percent cut for at least 10 years. ZeniMax argues the previous settlement of $500 million is "insufficient incentive for [Oculus] to cease infringing." Oculus, meanwhile, says that "ZeniMax's motion does not change the fact that the [original] verdict was legally flawed and factually unwarranted. We look forward to filing our own motion to set aside the jury's verdict and, if necessary, filing an appeal that will allow us to put this litigation behind us," the virtual reality company stated.Read Replies (0)
By BeauHD from Slashdot's pros-and-cons department
New submitter cherishjoo shares a report written by David Katzmaier via CNET: When the first curved TVs appeared more than three years ago I asked whether they were a gimmick. As a TV reviewer I had to give the curve a fighting chance, however, so I took a curved Samsung home to live with my family for awhile, in addition to subjecting it to a full CNET review. In the end, I answered my own question with the headline "Great picture quality, but the curved screen is a flat-out gimmick." Since then most of the video geeks I know, including just about everybody I hear from on Twitter, Facebook and article comments, pooh-poohs curved TV screens as a useless distraction. A curved TV takes the traditional flat screen and bends it along a gentle arc. The edges end up a bit closer, ostensibly providing a slight wraparound effect. Curved TV makers, citing huge curved screens like IMAX, call their sets more "immersive" than their flat counterparts, but in my experience that claim doesn't hold water at in-home (as opposed to theatrical) screen sizes and viewing distances. The only real image-quality benefit I saw to the curve was a reduction in reflections in some cases. That benefit wasn't worth the slight geometric distortions introduced by the curve, not to mention its awkwardness when hung on the wall. That said, the curve doesn't ruin an otherwise good picture. In TVs, assuming similar prices, curved vs. flat boils down to a choice of aesthetics. As Katzmaier mentioned, curved TVs have been on the market for several years now, and while manufacturers continue to produce them, the verdict on whether or not the pros outweigh the cons is still murky. Here's our question for you: Are curved televisions worth the inflated price tag? If you are in the market for a new TV, does the fact that the display is curved entice you or steer you away?Read Replies (0)
By BeauHD from Slashdot's ready-to-go department
An anonymous reader writes from a report via BleepingComputer: Necurs, the world's largest spam botnet with nearly five million infected bots, of which one million are active each day, has added a new module that can be used for launching DDoS attacks. The sheer size of the Necurs botnet, even in its worst days, dwarfs all of today's IoT botnets. The largest IoT botnet ever observed was Mirai Botnet #14 that managed to rack up around 400,000 bots towards the end of 2016 (albeit the owner of that botnet has now been arrested). If this new feature were to ever be used, a Necurs DDoS attack would easily break every DDoS record there is. Fortunately, no such attack has been seen until now. Until now, the Necurs botnet has been seen spreading the Dridex banking trojan and the Locky ransomware. According to industry experts, there's a low chance we'd see the Necurs botnet engage in DDoS attacks because the criminal group behind the botnet is already making too much money to risk exposing their full infrastructure in DDoS attacks.Read Replies (0)
By BeauHD from Slashdot's quick-before-it's-too-late department
According to Ars Technica, "The Federal Communications Commission plans to halt implementation of a privacy rule that requires ISPs to protect the security of its customers' personal information." From the report: The data security rule is part of a broader privacy rulemaking implemented under former Chairman Tom Wheeler but opposed by the FCC's new Republican majority. The privacy order's data security obligations are scheduled to take effect on March 2, but Chairman Ajit Pai wants to prevent that from happening. The data security rule requires ISPs and phone companies to take "reasonable" steps to protect customers' information -- such as Social Security numbers, financial and health information, and Web browsing data -- from theft and data breaches. The rule would be blocked even if a majority of commissioners supported keeping them in place, because the FCC's Wireline Competition Bureau can make the decision on its own. That "full commission vote on the pending petitions" could wipe out the entire privacy rulemaking, not just the data security section, in response to petitions filed by trade groups representing ISPs. That vote has not yet been scheduled. The most well-known portion of the privacy order requires ISPs to get opt-in consent from consumers before sharing Web browsing data and other private information with advertisers and other third parties. The opt-in rule is supposed to take effect December 4, 2017, unless the FCC or Congress eliminates it before then. Pai has said that ISPs shouldn't face stricter rules than online providers like Google and Facebook, which are regulated separately by the Federal Trade Commission. Pai wants a "technology-neutral privacy framework for the online world" based on the FTC's standards. According to today's FCC statement, the data security rule "is not consistent with the FTC's privacy standards."Read Replies (0)