Become a fan of Slashdot on Facebook

typodupeerror

Submission+-GNOME 3.14 Released

An anonymous reader writes: GNOME 3.14 was released today and it includes some interesting changes such as re-worked default theme, multi-touch gestures for both the system and applications, and new animations. Information including details on all the new features, can be found here.
Cloud

Submission+-One in six Amazon S3 storage buckets are ripe for data-plundering (infoworld.com)

tsamsoniw writes: "Using a combination of relatively low-tech techniques and tools, security researchers have discovered that they can access the contents of one in six Amazon Simple Storage Service (S3) buckets whose owners had them set to Public instead of Private. All told, researchers discovered and explored nearly 2,000 public buckets, according to Rapid 7 Senior Security Consultant Will Vandevanter, from which they gathered a list of more than 126 billion files, many of which contained sensitive information such as source code and personal employee information. Researchers noted that S3 URLs are all predictable and public facing, which make it that much easier to find the buckets in the first place with a scripting tool."
Android

Submission+-Researchers Uncover Targeted Attack Campaign Using Android Malware (threatpost.com)

Trailrunner7 writes: Android attacks have become all the rage in the last year or two, and targeted attacks against political activists in Tibet, Iran and other countries also have been bubbling up to the surface more and more often lately. Now those two trends have converged with the discovery of a targeted attack campaign that's going after Tibetan and Uyghur activists with a spear-phishing message containing a malicious APK file. Researchers say the attack appears to be coming from Chinese sources.

The new campaign began a few days ago when unknown attackers were able to compromise the email account of a well-known Tibetan activist. The attackers then used that account to begin sending a series of spear-phishing messages to other activists in the victim's contact list. One of the messages referred to a human rights conference in Geneva in March, using the recipients' legitimate interest in the conference as bait to get them to open the attachment. The malicious attachment in the emails is named "WUC's Conference.apk".

Security

Submission+-Twitter, Microsoft, LinkedIn, Yahoo open to hijacking (scmagazine.com.au)

mask.of.sanity writes: Twitter, Linkedin, Yahoo! and Hotmail accounts are open to hijacking thanks to a flaw that allows cookies to be stolen and reused.
Attackers need to intercept cookies while the user is logged into the service because the cookies expire on log-out ( except LinkedIn which keeps cookies for three months). The server will still consider them valid.
For the Twitter attack, you need to grab the auth_token string and insert it into your local Twitter cookies. Reload Twitter, and you'll be logged in as your target (video here). Not even password changes will kick you out.

Submission+-Binary usenet groups prohibited in the Netherlands (vrritti.com)

dutchwhizzman writes: Amsterdam based Usenet wholesale provider News Service Europe has been mandated by the court to remove all copyright infringing content on their servers, or face severe financial penalties. Dutch copyright MAFIAA organization BREIN has won a court case making the usenet provider responsible for the content posted on other platforms than their own.

Could this be the end of usenet as we know it, or will an appeal be won by NSE? Why didn't the judge make the provider that allowed the posts responsible? Why did the judge not honor the "cancel message" procedure that technically exists in the NNTP protocol?

Microsoft

Submission+-Battle for open standards in public education (janstedehouder.nl)

pjstevns writes: The heat is on! With the rising use of online systems for school administration the battle for open and accessible solutions is here, now. Parents are forced to buy 'proper' operating systems from your favorite Redmond based supplier — just to be able to access their childrens' grades, or participate in classes. A petition addressed at parliament for proper implementation of the open-standards guidelines put forward by the Dutch government itself is buzzing around the Netherlands. Comply or Explain!

CommentRe:Does it have a decent desktop? (Score 3, Informative)111

If you want to put items on your desktop, that's simple: use gnome-tweak-tool or set the org.gnome.desktop.background.show-desktop-icons property to true manually. The fact that this isn't enabled by default doesn't convey an arrogant attitude, but is a simple design decision that flows from the fact that Gnome3 doesn't implement a traditional desktop metaphor, and it wants to minimize visual distraction. For sure, this doesn't mean Gnome 3 is finished. It's only just taking off. There's a lot more in store in the area of 'finding and reminding' in upcoming releases, for instance. In the mean time you can try out some of the Gnome Shell Extensions to tweak the environment to your liking.

Slashdot Top Deals

Did you know that if you took all the economists in the world and lined them up end to end, they'd still point in the wrong direction?

Working...
close