By EditorDavid from Slashdot's persistent-popups department
This severe flaw in the browser security model affects only Internet Explorer 11, which unfortunately is the second most used browser version, after Chrome 55, with a market share of over 10%. Even worse for IE11 users, there's no fix available for this issue because the researcher has decided to stop reporting bugs to Microsoft after they've ignored many of his previous reports. For IE11 users, a demo page is available here.Read Replies (0)
By EditorDavid from Slashdot's Mario-where-are-you? department
A project to preserve (and validate) every Super Nintendo game ROM had been derailed when the post office lost a package containing 100 games from the PAL region. But now Byuu, the creator of the Higan SNES emulator, reports that the package has been found. An anonymous reader writes:
Thursday Byuu finally posted photos of the unboxing for the package that was shipped to him January 5th. "I'd like to offer my sincerest apologies to the USPS for assuming the worst in that these games were stolen. I should not have been so hasty to assume malicious intent." At the same time, Byuu writes that "My package was sitting in Atlanta, GA for well over a month with my address clearly visible right on the box. Had this case not been escalated to the media, it likely would have gone up for auction in a bin with other electronics sometime in March."
Byuu is now refunding donations he'd received to replace the missing games, and says he can now also resume work on the SNES Preservation Project.
And going forward, according to Eurogamer, "Byuu has said he will be more cautious with shipping games in the future -- only using smaller shipments, or buying individual games to scan and archive then selling them on to get some money back."Read Replies (0)
By EditorDavid from Slashdot's grey-areas department
An anonymous reader writes:
"Chats that seem to be more ephemeral than email are still being recorded on a server somewhere," reports Fast Company, noting that Slack's Data Request Policy says the company will turn over data from customers when "it is compelled by law to do so or is subject to a valid and binding order of a governmental or regulatory body...or in cases of emergency to avoid death or physical harm to individuals." Slack will notify customers before disclosure "unless Slack is prohibited from doing so," or if the data is associated with "illegal conduct or risk of harm to people or property."
The article also warns that like HipChat and Campfire, Slack "is encrypted only at rest and in transit," though a Slack spokesperson says they "may evaluate" end-to-end encryption at some point in the future. Slack has no plans to offer local hosting of Slack data, but if employers pay for a Plus Plan, they're able to access private conversations.
Though Slack has 4 million users, the article points out that there's other alternatives like Semaphor and open source choices like Wickr and Mattermost. I'd be curious to hear what Slashdot readers are using at their own workplaces -- and how they feel about the privacy and security of Slack?Read Replies (0)
By EditorDavid from Slashdot's parsing-problems department
"The Java and Python runtimes fail to properly validate FTP URLs, which can potentially allow attackers to punch holes through firewalls to access local networks," reports CSO Online. itwbennett writes: Last weekend security researcher Alexander Klink disclosed an interesting attack where exploiting an XML External Entity vulnerability in a Java application can be used to send emails. At the same time, he showed that this type of vulnerability can be used to trick the Java runtime to initiate FTP connections to remote servers. After seeing Klink's exploit, Timothy Morgan, a researcher with Blindspot Security, decided to disclose a similar attack that works against both Java's and Python's FTP implementations. "But his attack is more serious because it can be used to punch holes through firewalls," writes Lucian Constantin in CSO Online. "The Java and Python developers have been notified of this problem, but until they fix their FTP client implementations, the researcher advises firewall vendors to disable classic mode FTP translation by default..." reports CSO Online. "It turns out that the built-in implementation of the FTP client in Java doesn't filter out special carriage return and line feed characters from URLs and actually interprets them. By inserting such characters in the user or password portions of an FTP URL, the Java FTP client can be tricked to execute rogue commands..."Read Replies (0)
By BeauHD from Slashdot's time-to-jump-ship department
An anonymous reader quotes a report from AppleInsider: A U.S. Securities and Exchange Commission filing on Friday reveals Apple board member Al Gore this week sold 215,437 shares of Apple stock (APPL) worth about $29.5 million. Gore's stock sale, which was accomplished in multiple trades ranging from $136.4 to $137.12 on Wednesday, nearly matches a $29.6 million purchase of Apple shares made in 2013. When Gore bought the stock batch more than four years ago, he exercised Apple's director stock option to acquire 59,000 shares at a price of about $7.48 per share, costing him approximately $441,000. This was pre-split AAPL, so shares were valued at $502.68 each. Following today's sale, Gore owns 230,137 shares of Apple stock worth $31.5 million at the end of trading on Friday.Read Replies (0)
By BeauHD from Slashdot's insect-intelligence department
Clint Perry, a biologist who studies the evolution of cognition in insects at Queen Mary University of London, and his colleagues have released the results of a creative new experiment in which they essentially taught bumblebees how to play "bee soccer." "The insects' ability to grasp this novel task is a big score for insect intelligence, demonstrating that they're even more complex thinkers than we thought," reports Smithsonian. From the report: For the study, published in the February 23 issue of Science, researchers gave a group of bees a novel goal (literally): to move a ball about half their size into a designated target area. The idea was to present them with a task that they would never have encountered in nature. Not only did the bees succeed at this challenge -- earning them a sugary treat -- but they astonished researchers by figuring out how to meet their new goal in several different ways. Some bees succeeded at getting their ball into the goal with no demonstration at all, or by first watching the ball move on its own. But the ones that watched other bees successfully complete the game learned to play more quickly and easily. Most impressively, the insects didn't simply copy each other -- they watched their companions do it, then figured out on their own how to accomplish the task even more efficiently using their own techniques. The results show that bees can master complex, social behaviors without any prior experience -- which could be a boon in a world where they face vast ecological changes and pressures.Read Replies (0)
By BeauHD from Slashdot's stop-dead-in-your-tracks department
ZeniMax, the parent company of Fallout and Skyrim developer Bethesda, has filed for an injunction against virtual-reality company Oculus over the recent stolen technology case. The company had accused Oculus of stealing VR-related code, and was subsequently awarded $500 million by a Dallas court earlier this month. ZeniMax has now filed additional papers against Oculus, requesting that Oculus' products using the stolen code be removed from sale. GameSpot reports: Specifically, ZeniMax is seeking to block sales of its mobile and PC developer kits, as well as technology allowing the integration of Oculus Rift with development engines Unreal and Unity, reports Law360. If the injunction isn't granted, ZeniMax wants a share of "revenues derived from products incorporating its intellectual properties," suggesting a 20 percent cut for at least 10 years. ZeniMax argues the previous settlement of $500 million is "insufficient incentive for [Oculus] to cease infringing." Oculus, meanwhile, says that "ZeniMax's motion does not change the fact that the [original] verdict was legally flawed and factually unwarranted. We look forward to filing our own motion to set aside the jury's verdict and, if necessary, filing an appeal that will allow us to put this litigation behind us," the virtual reality company stated.Read Replies (0)
By BeauHD from Slashdot's pros-and-cons department
New submitter cherishjoo shares a report written by David Katzmaier via CNET: When the first curved TVs appeared more than three years ago I asked whether they were a gimmick. As a TV reviewer I had to give the curve a fighting chance, however, so I took a curved Samsung home to live with my family for awhile, in addition to subjecting it to a full CNET review. In the end, I answered my own question with the headline "Great picture quality, but the curved screen is a flat-out gimmick." Since then most of the video geeks I know, including just about everybody I hear from on Twitter, Facebook and article comments, pooh-poohs curved TV screens as a useless distraction. A curved TV takes the traditional flat screen and bends it along a gentle arc. The edges end up a bit closer, ostensibly providing a slight wraparound effect. Curved TV makers, citing huge curved screens like IMAX, call their sets more "immersive" than their flat counterparts, but in my experience that claim doesn't hold water at in-home (as opposed to theatrical) screen sizes and viewing distances. The only real image-quality benefit I saw to the curve was a reduction in reflections in some cases. That benefit wasn't worth the slight geometric distortions introduced by the curve, not to mention its awkwardness when hung on the wall. That said, the curve doesn't ruin an otherwise good picture. In TVs, assuming similar prices, curved vs. flat boils down to a choice of aesthetics. As Katzmaier mentioned, curved TVs have been on the market for several years now, and while manufacturers continue to produce them, the verdict on whether or not the pros outweigh the cons is still murky. Here's our question for you: Are curved televisions worth the inflated price tag? If you are in the market for a new TV, does the fact that the display is curved entice you or steer you away?Read Replies (0)
By BeauHD from Slashdot's ready-to-go department
An anonymous reader writes from a report via BleepingComputer: Necurs, the world's largest spam botnet with nearly five million infected bots, of which one million are active each day, has added a new module that can be used for launching DDoS attacks. The sheer size of the Necurs botnet, even in its worst days, dwarfs all of today's IoT botnets. The largest IoT botnet ever observed was Mirai Botnet #14 that managed to rack up around 400,000 bots towards the end of 2016 (albeit the owner of that botnet has now been arrested). If this new feature were to ever be used, a Necurs DDoS attack would easily break every DDoS record there is. Fortunately, no such attack has been seen until now. Until now, the Necurs botnet has been seen spreading the Dridex banking trojan and the Locky ransomware. According to industry experts, there's a low chance we'd see the Necurs botnet engage in DDoS attacks because the criminal group behind the botnet is already making too much money to risk exposing their full infrastructure in DDoS attacks.Read Replies (0)
By BeauHD from Slashdot's quick-before-it's-too-late department
According to Ars Technica, "The Federal Communications Commission plans to halt implementation of a privacy rule that requires ISPs to protect the security of its customers' personal information." From the report: The data security rule is part of a broader privacy rulemaking implemented under former Chairman Tom Wheeler but opposed by the FCC's new Republican majority. The privacy order's data security obligations are scheduled to take effect on March 2, but Chairman Ajit Pai wants to prevent that from happening. The data security rule requires ISPs and phone companies to take "reasonable" steps to protect customers' information -- such as Social Security numbers, financial and health information, and Web browsing data -- from theft and data breaches. The rule would be blocked even if a majority of commissioners supported keeping them in place, because the FCC's Wireline Competition Bureau can make the decision on its own. That "full commission vote on the pending petitions" could wipe out the entire privacy rulemaking, not just the data security section, in response to petitions filed by trade groups representing ISPs. That vote has not yet been scheduled. The most well-known portion of the privacy order requires ISPs to get opt-in consent from consumers before sharing Web browsing data and other private information with advertisers and other third parties. The opt-in rule is supposed to take effect December 4, 2017, unless the FCC or Congress eliminates it before then. Pai has said that ISPs shouldn't face stricter rules than online providers like Google and Facebook, which are regulated separately by the Federal Trade Commission. Pai wants a "technology-neutral privacy framework for the online world" based on the FTC's standards. According to today's FCC statement, the data security rule "is not consistent with the FTC's privacy standards."Read Replies (0)
By BeauHD from Slashdot's safety-first department
An anonymous reader quotes a report from ZDNet: A security lapse at a New York international airport left its server backups exposed on the open internet for almost a year, ZDNet has found. The internet-connected storage drive contained several backup images of servers used by Stewart International Airport, but neither the backup drive nor the disk images were password protected, allowing anyone to access their contents. Since April last year, the airport had been inadvertently leaking its own highly-sensitive files as a result of the drive's misconfiguration. Vickery, who also posted an analysis of his findings, said the drive "was, in essence, acting as a public web server" because the airport was backing up unprotected copies of its systems to a Buffalo-branded drive, installed by a contract third-party IT specialist. When contacted Thursday, the contractor dismissed the claims and would not comment further. Though the listing still appears on Shodan, the search engine for unprotected devices and databases, the drive has since been secured. The files contained eleven disk images, accounting for hundreds of gigabytes of files and folders, which when mounted included dozens of airport staff email accounts, sensitive human resources files, interoffice memos, payroll data, and what appears to be a large financial tracking database. Many of the files we reviewed include "confidential" internal airport documents, which contain schematics and details of other core infrastructure.Read Replies (0)