Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security

New Cridex Malware Copies Tactics From GameOver Zeus 18

Trailrunner7 writes The GameOver Zeus malware had a nice run for itself, making untold millions of dollars for its creators. But it was a run that ended with a multi-continent operation from law enforcement and security researchers to disassemble the infrastructure. Now researchers have identified a new variant of the Cridex malware that has adopted some of the techniques that made GOZ so successful in its day.

Researchers at IBM's X-Force research team have seen a new version of Cridex, which is also known as Bugat and Feodo, using some of the same techniques that GOZ used to such good effect. Specifically, the new strain of malware has adopted GOZ's penchant for using HTML injections, and the researchers say the technique is nearly identical to the way that GOZ handled it.

"There are two possible explanations for this. First, someone from the GOZ group could have moved to the Bugat team. This would not be the first time something like this has happened, which we've witnessed in other cases involving Zeus and Citadel; however, it is not very likely in this case since Bugat and GOZ are essentially competitors, while Zeus and Citadel are closely related. The second and more likely explanation is that the Bugat team could have analyzed and perhaps reversed the GOZ malware before copying the HTML injections that made GOZ so highly profitable for its operators," Etay Maor, a senior fraud prevention strategist at IBM, wrote in an analysis of the new malware.
Power

Is Storage Necessary For Renewable Energy? 442

mdsolar writes Physicist and energy expert Amory Lovins, chief scientist at The Rocky Mountain Institute, recently released a video in which he claims that renewable energy can meet all of our energy needs without the need for a fossil fuel or nuclear baseload generation. There's nothing unusual about that — many people have made that claim — but he also suggests that this can be done without a lot of grid-level storage. Instead, Lovins describes a "choreography" between supply and demand, using predictive computer models models to anticipate production and consumption, and intelligent routing to deliver power where it's needed. This "energy dance," combined with advances in energy efficiency, will allow us to meet all of our energy needs without sacrificing reliability.
Censorship

Financial Services Group WCS Sues Online Forum Over Negative Post 112

First time accepted submitter kavzee writes The popular Australian online discussion forum, Whirlpool, is being sued by a financial services group for refusing to remove a negative review about its services. A similar story occurred a number of years ago when another company by the name of 2Clix attempted to sue Whirlpool for the same reasons but later withdrew their case. "A financial services business licenced through National Australia Bank is suing an online forum for refusing to remove an allegedly fake and negative post about its services, claiming it has damaged its reputation with would-be clients. It is the latest legal action launched against an online forum or review website for publishing negative comments, following several high profile cases in Australia and overseas. Financial advice group WCS Group has initiated action against Whirlpool in the Supreme Court of Victoria, seeking unspecified damages and costs, despite the fact the forum generates no revenue."
Shark

Scientists Record Quantum Behavior of Electrons Via Laser Lights 33

An anonymous reader writes in with news about a breakthrough in recording quantum behavior in electrons. A group of researchers has said that they have come up with a new method to record and control electron behavior at the quantum mechanical level. The research team, headed by the scientists at the University of Chicago, used laser lights in ultra-fast pulses for the experiment. The laser light controlled the quantum state of electrons. It contained inside nanoscale defects in a diamond. The researchers observed changes in that electron over a time period. They focused on the quantum mechanical property of electrons known as spin. Lead author David Awschalom, a molecular engineering professor at a university in Chicago, said, "These defects have attracted great interest of the scientists over the past decade. They provide a test-bed system for developing semiconductor quantum bits as well as nanoscale sensors."
Science

Researchers Discover New Plant "Language" 70

An anonymous reader writes A Virginia Tech scientist has discovered a potentially new form of plant communication, that allows them to share genetic information with one another. Jim Westwood, a professor of plant pathology, physiology, and weed science, found evidence of this new communication mode by investigating the relationship between dodder, a parasitic plant, and the flowering plant Arabidopsis and tomato plants to which it attaches and sucks out nutrients with an appendage called a haustorium. Westwood examined the plants' mRNA, the molecule in cells that instructs organisms how to code certain proteins that are key to functioning. MRNA helps to regulate plant development and can control when plants eventually flowers. He found that the parasitic and the host plants were exchanging thousands of mRNA molecules between each other, thus creating a conversation.
Businesses

Microsoft Considered Renaming Internet Explorer To Escape Its Reputation 426

An anonymous reader writes "Microsoft's Internet Explorer engineering team told a Reddit gathering that discussions about a name change have taken place and could happen again. From the article: "Microsoft has had "passionate" discussions about renaming Internet Explorer to distance the browser from its tarnished image, according to answers from members of the developer team given in a reddit Ask Me Anything session today. In spite of significant investment in the browser—with the result that Internet Explorer 11 is really quite good—many still regard the browser with contempt, soured on it by the lengthy period of neglect that came after the release of the once-dominant version 6. Microsoft has been working to court developers and get them to give the browser a second look, but the company still faces an uphill challenge."

Submission + - Scientists record quantum behavior of electrons via laser lights

An anonymous reader writes: A group of researchers has said that they have come up with a new method to record and control electron behavior at the quantum mechanical level. The research team, headed by the scientists at the University of Chicago, used laser lights in ultrafast pulses for the experiment. The laser light controlled the quantum state of electrons. It contained inside nanoscale defects in a diamond. The researchers observed changes in that electron over a time period. They focused on the quantum mechanical property of electrons known as spin. Lead author David Awschalom, a molecular engineering professor at a university in Chicago, said, “These defects have attracted great interest of the scientists over the past decade. They provide a test-bed system for developing semiconductor quantum bits as well as nanoscale sensors.”

Submission + - Researchers Discover New Plant "Language"

An anonymous reader writes: A Virginia Tech scientist has discovered a potentially new form of plant communication, that allows then to share genetic information with one another. Jim Westwood, a professor of plant pathology, physiology, and weed science, found evidence of this new communication mode by investigating the relationship between dodder, a parasitic plant, and the flowering plant Arabidopsis and tomato plants to which it attaches and sucks out nutrients with an appendage called a haustorium. Westwood examined the plants’ mRNA, the molecule in cells that instructs organisms how to code certain proteins that are key to functioning. MRNA helps to regulate plant development and can control when plants eventually flowers. He found that the parasitic and the host plants were exchanging thousands of mRNA molecules between each other, thus creating a conversation.
Advertising

The Man Responsible For Pop-Up Ads On Building a Better Web 135

An anonymous reader writes Above all, Ethan Zuckerman wants you to know that he is sorry. In the mid-1990s, Zuckerman was working as a designer and programmer for Tripod.com when he wrote the code for the first pop-up ad. He says: "At the end of the day, the business model that got us funded was advertising. The model that got us acquired was analyzing users’ personal homepages so we could better target ads to them. Along the way, we ended up creating one of the most hated tools in the advertiser’s toolkit: the pop-up ad. It was a way to associate an ad with a user’s page without putting it directly on the page, which advertisers worried would imply an association between their brand and the page’s content. Specifically, we came up with it when a major car company freaked out that they’d bought a banner ad on a page that celebrated anal sex. I wrote the code to launch the window and run an ad in it. I’m sorry. Our intentions were good."
United Kingdom

Correcting Killer Architecture 98

minstrelmike writes In Leeds, England, architects are adding a plethora of baffles and other structures to prevent the channeling of winds from a skyscraper that have pushed baby carriages into the street and caused one pedestrian death by blowing over a truck. Other architectural mistakes listed in the article include death ray buildings that can melt car bumpers and landscape ponds that blind tenants.
United States

US Defense Contractors Still Waiting For Breach Notification Rules 19

An anonymous reader writes US Department of Defense contractors will have to wait until September 24 to see what specific rules they will be required to follow when it comes to the reporting of computer breaches to the DoD. This particular requirement has been mandated by the US Congress last year, in an attempt to get clear view of the type and frequency of attacks contractors face. The US Congress will require "cleared defense contractors" — i.e. those who have been granted clearance by the DoD to access, receive, or store classified information — to effect a rapid report in the wake of a successful breach, and to include in it a description of the technique or method used in the penetration, a sample of the malicious software used (if discovered), and a summary of information created for the Department in connection with any Department program that has been potentially compromised due to such penetration.
United States

How Drones Entered the FBI's Spying Toolkit 39

Jason Koebler writes The FBI has had an eager eye on surveillance drones since first experimenting with remote control airplanes in 1995. But budget cuts nearly ended the Bureau's unmanned machinations in 2010, and it took a dedicated push aimed at making drones "a tool the FBI cannot do without" to cement their place in the FBI's surveillance toolkit. The near termination—and subsequent expansion—of the FBI's drone program over the past four years is chronicled in hundreds of heavily-redacted pages released under a lawsuit filed by Citizens for Responsibility and Ethics in Washington over the past several months.

Feed Google News Sci Tech: Star dust taken from comet tail excites scientists - Contra Costa Times (google.com)


Fox News

Star dust taken from comet tail excites scientists
Contra Costa Times
We're all made of star dust, as Carl Sagan famously observed. But the nature of that dust, long before it assembled into us, is a scientific mystery whose answer may lie in a box in a UC Berkeley lab. A team of scientists there say they've captured the first...
Scientists Find Dust Particles Likely From Outside Solar SystemNewsmax.com
First Specks Of Stardust Found After Years Of SearchingForbes
Stardust Grains May Reveal First Look at Interstellar SpaceNDTV
Reuters-Headlines & Global News
all 104 news articles

Transportation

Berlin Bans Car Service Uber 341

An anonymous reader is just one of many who have pointed out that things don't look good for Uber in Berlin. Berlin has banned car service Uber, which allows users to summon a ride on their smartphone, for not offering drivers and vehicles licensed to carry passengers, or full insurance cover, the German capital said. The ban takes immediate effect and Uber risks fines of up to 25,000 euros each time it violates the city's Public Transport Act, Berlin authorities said in a statement. Uber said on Thursday it would appeal against the decision, accusing Berlin of denying its people choice and mobility. "As a new entrant we are bringing much-needed competition to a market that hasn't changed in years. Competition is good for everyone and it raises the bar and ultimately it's the consumer who wins," said Fabien Nestmann, German General Manager at Uber. Undaunted by the setback in Berlin, Uber has launched uberTAXI in Hong Kong.

Slashdot Top Deals

May Euell Gibbons eat your only copy of the manual!

Working...