Privacy

Privacy In the Age of Persistence 120

Bruce Schneier recently wrote another essay on privacy for the BBC concentrating on how data seems to be the "pollution of the information age" and where this seems to be leading. "We're not going to stop the march of technology, just as we cannot un-invent the automobile or the coal furnace. We spent the industrial age relying on fossil fuels that polluted our air and transformed our climate. Now we are working to address the consequences. (While still using said fossil fuels, of course.) This time around, maybe we can be a little more proactive. Just as we look back at the beginning of the previous century and shake our heads at how people could ignore the pollution they caused, future generations will look back at us — living in the early decades of the information age — and judge our solutions to the proliferation of data."
The Courts

Use Your iPhone To Get Out of a Ticket 291

An anonymous reader writes to tell us that Parkingticket.com just announced new compatibility with the Safari web browser on Apple's iPhone, giving you new tools to immediately contest a parking ticket. The site is so confident in their service that if all steps are followed and the ticket is still not dismissed they will pay $10 towards your ticket. "The process begins by navigating the iPhone's Safari browser to the Parkingticket.com website where you'll find a straightforward means to fight a parking ticket; whether the ticket was issued in New York City, San Francisco, Boston, Philadelphia or Washington, D.C. Simply register for a free account and choose the city in which the ticket was issued. Enter your ticket and vehicle details then answer a few quick questions. The detailed process takes about ten minutes, from A-Z. To allow easy entry of your ticket, a look-a-like parking ticket is displayed — for your specific city — with interactive functionality."
The Internet

The Chinese (Web Servers) Are Coming 231

Glyn Moody writes "The February 2009 Netcraft survey is not the usual 'Apache continues to trounce Microsoft IIS' story: there's a new entrant — from China. 'This majority of this month's growth is down to the appearance of 20 million Chinese sites served by QZHTTP. This web server is used by QQ to serve millions of Qzone sites beneath the qq.com domain.' What exactly is this QZHTTP, and what does it all mean for the world of Web servers?"
Security

Hackers Jump On Newest IE7 Bug 162

CWmike writes "Attackers are already exploiting a bug in Internet Explorer 7 that Microsoft patched just last week, security researchers warned today. Although the attacks are currently in 'very, very small numbers,' they may be just the forerunner of a larger campaign, said Trend Micro's Jamz Yaneza. 'I see this as a proof-of-concept,' said Yaneza, who noted that the exploit's payload is extremely straightforward and explained that there has been no attempt to mask it by, say, planting a root kit on the victimized PC at the same time. 'I wouldn't be surprised to see this [exploit] show up in one of those Chinese exploit kits,' he added. The new attack code, which Trend Micro dubbed 'XML_Dloadr.a,' arrives in a spam message as a malicious file masquerading as a Microsoft Word document."
Spam

Verizon.net Finally Moving Email To Port 587 195

The Washington Post's Security Fix blog is reporting that Verizon, long identified as the largest ISP source of spam, is moving to require use of the submission port, 587, in outbound mail — and thus to require authentication. While spammers may still be able to relay spam through zombies in Verizon's network, if the victims let their mail clients remember their authentication credentials, at least the zombies will be easily identifiable. Verizon pledges to clean up their zombie problem quickly. We'll see.
Privacy

Ontario Court Wrong About IP Addresses, Too 258

Frequent Slashdot contributor Bennett Haselton comments on a breaking news story out of the Canadian courts: "An Ontario Superior Court Justice has ruled that Canadian police can obtain the identities of Internet users without a warrant, writing that there is 'no reasonable expectation of privacy' for a user's online identity, and drawing the analogy that 'One's name and address or the name and address of your spouse are not biographical information one expects would be kept private from the state.' But why in the world is it valid to compare an IP address with a street address in the phone book?" Read on for Bennett's analysis.
Hardware Hacking

Stop-Motion Modbook Upgrade Video 14

Brian Northway writes "This funny, stop-motion, photo-animated video shows the process of converting an Apple MacBook to an Axiotron Modbook tablet, in one minute and fifty-nine seconds — viewable in standard quality or high-definition (720p), for exceptional detail. It's the latest installment a series of light-speed technical videos that I've created, wihich include the explorational disassembly of a PSP-3000, a unibody MacBook Pro, a MacBook Air, an iPhone, and many other Apple devices."
Spam

KnujOn Updates Top 10 Spam-Friendly Registrars List 80

alphadogg writes "Some companies are more popular than others for spammers wanting to register their domain names. Spam-fighting organization KnujOn has updated its report on the top 10 registrars whose customers are linked to spam and other illicit activity. (We discussed the original report last year.) These 10 companies registered 83% of the domains spammed in KnujOn's sample of spam between June and January. KnujOn found that some companies have cleaned up their act in recent months and that others — most surprisingly, Network Solutions and GoDaddy sister company Wild West domains — have popped up on the list. At the top of KnujOn's list, for the second time in a row, is Xinnet.com, a Chinese registrar linked to more than 3 million spam messages. KnujOn recommends that ICANN threaten to pull Xinnet's accreditation, as it did for some of the offenders on the previous list."
Government

Could Fake Phishing Emails Help Fight Spam? 296

Glyn Moody writes "Apparently, the US Department of Justice has been sending out hoax emails to test the security awareness of its staff. How about applying a similar strategy to tackling spam among ordinary users? If fake spam messages offering all the usual benefits, and employing all the usual tricks, were sent out by national security agencies around the world, it would select precisely the people who tend to respond to spam. The agencies could then contact them from a suitably important-looking government address, warning about what could have happened. Some might become more cautious as a result, others will not. But again, it is precisely the latter who are more likely to respond to further fake spam messages in the future, allowing the process to be repeated as often as necessary. The system would be cheap to run — spam is very efficient — and could use the latest spam as templates."
Windows

If Windows 7 Fails, Citrix (Not Linux) Wins 638

Julie188 writes "Microsoft blogger Mitchell Ashley, who has been using Windows 7 full-time, predicts that Windows 7 will fail to lure XP users away from their beloved, aging operating system — after all, Windows 7 is little more than what Vista should have been, when it shipped two years ago. But eventually old PCs must be replaced and then we'll see corporations, desperate to get out of the expense of managing Windows machines, get wise. Instead of buying new Windows 7 PCs, they could deliver virtualized XP desktops to a worker's own PC and/or mobile device. Ashley believes that Citrix's Project Independence has the right idea."
The Internet

YouTube To Allow Self-Serve Ads For Major Media Players 115

thefickler writes to tell us that YouTube plans on raising revenue by allowing major media players to run their own ads on the video site for, not only their own content, but illegally uploaded content by other users. "The site says CBS is already on board for the scheme, with other giants expected to join. The scheme will allow TV, movie and music companies to upload content and then sell advertising themselves, for example through images or animations which are overlaid on suitable sections of the clips. YouTube will then take a cut of this advertising revenue."
Spam

Despite Gates' Prediction, Spam Far From a Thing of the Past 198

Slatterz writes "Bill Gates declared in 2004 at the World Economic Forum in Switzerland that spam would be 'a thing of the past' within five years. However, Graham Cluley, senior technology consultant at Sophos, has written in a blog post that 'with the prophecy's five-year anniversary approaching, spam continues to cause a headache for companies and home users.'"

Generational Windows Multicore Performance Tests 228

snydeq writes "Windows XP, Windows Vista, and (soon) Windows 7 all support SMP out of the box, but as InfoWorld's Randall Kennedy notes, 'experience has shown that multiprocessing across discrete CPUs is not the same thing as multiprocessing across integrated cores within the same CPU.' As such, Kennedy set out to stress the multiprocessing capabilities of Windows XP, Windows Vista, and Windows 7 in dual-core and quad-core performance tests. The comprehensive, multiprocess workload tests were undertaken to document scalability, execution efficiency, and raw performance of workloads. 'What I found may surprise you,' Kennedy writes. 'Not only does Microsoft have a firm grasp of multicore tuning, but its scalability story promises to keep getting better with time. In other words, Windows Vista and Windows 7 are poised to reap ever greater performance benefits as Intel and AMD extend the number of cores in future editions of their processors.'"

GPUs Used To Crack WiFi Passwords Faster 189

MojoKid writes "Russian-based ElcomSoft has just released ElcomSoft Wireless Security Auditor 1.0, which can take advantage of both Nvidia and ATI GPUs. ElcomSoft claims that the software uses a 'proprietary GPU acceleration technology,' which implies that neither CUDA, Stream, nor OpenCL are being utilized in this instance. At its heart, what ElcomSoft Wireless Security Auditor does is perform brute-force dictionary attacks of WPA and WPA2 passwords. If an access point is set up using a fairly insecure password that is based on dictionary words, there is a higher likelihood that a password can be guessed. ElcomSoft positions the software as a way to 'audit' wireless network security."
Spam

Aussie Regulator Comes Down On SMS Spam 76

An anonymous reader writes "The Australian Communications and Media Authority has commenced legal proceedings in the Federal Court against several local and international companies over allegedly unsolicited SMS spam. It's the first time the regulator has used its powers under the Spam Act to pursue an alleged SMS spammer through the Courts. Other companies have been fined or committed to an 'enforceable undertaking' to avoid this type of action (although these are not without issue). Another firm accused of SMS spam accused the regulator of being overzealous after it received a formal warning. The regulator appears to have instituted a crackdown on the premium mobile content industry in recent months, culminating in this latest action."
Security

Storm Worm Botnet "Cracked Wide Open" 301

Heise Security reports that a 'team of researchers from Bonn University and RWTH Aachen University have analysed the notorious Storm Worm botnet, and concluded it certainly isn't as invulnerable as it once seemed. Quite the reverse, for in theory it can be rapidly eliminated using software developed and at least partially disclosed by Georg Wicherski, Tillmann Werner, Felix Leder and Mark Schlösser. However it seems in practice the elimination process would fall foul of the law.'
Spam

Lexus To Start Spamming Car Buyers In Their Cars 317

techmuse writes "Lexus has announced plans to send targeted messages to buyers of its cars based on the buyer's zip code and vehicle type. Unlike regular spam, these messages will be delivered directly to the buyer's vehicle, and will play to the vehicle's occupants as audio. Lexus has promised to make the messages relevant to the car buyers." Imagine the fun that some targeted malware could do — not that such a thing could happen to a Lexus.

Slashdot Top Deals