Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Businesses

Staples: Breach May Have Affected 1.16 Million Customers' Cards 62

Posted by timothy
from the your-name-here dept.
mpicpp writes with this excerpt from Fortune: Staples said Friday afternoon that nearly 1.16 million customer payment cards may have been affected in a data breach under investigation since October. The office-supply retailer said two months ago that it was working with law enforcement officials to look into a possible hacking of its customers' credit card data. Staples said in October that it had learned of a potential data theft at several of its U.S. stores after multiple banks noticed a pattern of payment card fraud suggesting the company computer systems had been breached. Now, Staples believes that point-of-sale systems at 115 Staples locations were infected with malware that thieves may have used to steal customers' names, payment card numbers, expiration dates and card verification codes, Staples said on Friday. At all but two of those stores, the malware would have had access to customer data for purchases made between August 10 and September 16 of this year. At the remaining two stores, the malware was active from July 20 through September 16, the company said.
Cellphones

T-Mobile To Pay $90M For Unauthorized Charges On Customers' Bills 43

Posted by timothy
from the oh-you-wanted-honesty dept.
itwbennett writes T-Mobile US will pay at least $90 million to settle a Federal Communications Commission (FCC) suit that alleged it looked the other way while third parties charged T-Mobile subscribers for services they didn't want. The settlement is the second largest ever for so-called 'cramming,' following one that the FCC reached with AT&T in October. It came just two days after the Consumer Financial Protection Bureau sued Sprint for the same practice.
The Courts

All the Evidence the Government Will Present In the Silk Road Trial Is Online 44

Posted by Soulskill
from the defendant-knowingly-and-willfully-went-on-the-internets dept.
apexcp writes: In less than a month, one of the biggest trials of 2015 will begin in New York City. The full list of government evidence and defense objections found its way online recently, shedding light on both the prosecutor's courtroom strategy and the defense team's attempted rebuttals. Also important is what's not presented as evidence. There's not a single piece of forensic documentation about how the FBI originally found Silk Road servers, an act the defense has called "blatantly criminal."
Piracy

Anyone Can Now Launch Their Own Version of the Pirate Bay 76

Posted by Soulskill
from the we're-all-spartacus dept.
An anonymous reader writes: Not satisfied with merely launching The Old Pirate Bay, torrent site isoHunt today debuted The Open Bay, which lets anyone deploy their own version of The Pirate Bay online. This is achieved via a new six-step wizard, which the group says requires you to be somewhat tech-savvy and have "minimal knowledge of how the Internet and websites work." The Pirate Bay, the most popular file sharing website on the planet, went down last week following police raids on its data center in Sweden. As we've noted before, The Old Pirate Bay appears to be the best alternative at the moment, but since The Pirate Bay team doesn't know if it's coming back yet, there is still a huge hole left to be filled.
Security

Researchers Discover SS7 Flaw, Allowing Total Access To Any Cell Phone, Anywhere 80

Posted by Soulskill
from the just-in-case-you-were-feeling-safe-and-secure-today dept.
krakman writes: Researchers discovered security flaws in SS7 that allow listening to private phone calls and intercepting text messages on a potentially massive scale – even when cellular networks are using the most advanced encryption now available. The flaws, to be reported at a hacker conference in Hamburg this month, are actually functions built into SS7 for other purposes – such as keeping calls connected as users speed down highways, switching from cell tower to cell tower – that hackers can repurpose for surveillance because of the lax security on the network. It is thought that these flaws were used for bugging German Chancellor Angela's Merkel's phone.

Those skilled at the housekeeping functions built into SS7 can locate callers anywhere in the world, listen to calls as they happen or record hundreds of encrypted calls and texts at a time for later decryption (Google translation of German original). There is also potential to defraud users and cellular carriers by using SS7 functions, the researchers say. This is another result of security being considered only after the fact, as opposed to being part of the initial design.
The Courts

Colorado Sued By Neighboring States Over Legal Pot 445

Posted by samzenpus
from the crossing-the-line dept.
SternisheFan notes that Nebraska and Oklahoma are suing Colorado over marijuana legalization. The attorneys general of Nebraska and Oklahoma sued Colorado in the U.S. Supreme Court on Thursday, arguing state-legalized marijuana from Colorado is improperly spilling across state lines. The suit invokes the federal government's right to regulate both drugs and interstate commerce, and says Colorado's decision to legalize marijuana has been "particularly burdensome" to police agencies on the other side of the state line. In June, USA TODAY highlighted the flow of marijuana from Colorado into small towns across Nebraska: felony drug arrests in Chappell, Neb., just 7 miles north of the Colorado border have skyrocketed 400% in three years. "In passing and enforcing Amendment 64, the state of Colorado has created a dangerous gap in the federal drug control system enacted by the United States Congress. Marijuana flows from this gap into neighboring states, undermining plaintiff states' own marijuana bans, draining their treasuries, and placing stress on their criminal justice systems," says the lawsuit. "The Constitution and the federal anti-drug laws do not permit the development of a patchwork of state and local pro-drug policies and licensed distribution schemes throughout the country which conflict with federal laws."
Crime

FBI Confirms Open Investigation Into Gamergate 514

Posted by samzenpus
from the looking-into-it dept.
v3rgEz writes In a terse form letter responding to a FOIA request, the FBI has confirmed it has an open investigation into Gamergate, the loose but controversial coalition of gamers calling for ethics in gaming journalism — even as some members have harassed and sent death threats to female gaming developers and critics.
Censorship

"Team America" Gets Post-Hack Yanking At Alamo Drafthouse, Too 225

Posted by timothy
from the meet-your-new-program-director dept.
Slate reports that even old movies are enough to trigger a pretty strong knee jerk: Team America, World Police, selected as a tongue-in-cheek replacement by Dallas's Alamo Drafthouse Theater for the Sony-yanked The Interview after that film drew too much heat following the recent Sony hack, has also been pulled. The theater's tweet, as reprinted by Slate: "due to circumstances beyond our control,” their Dec. 27 Team America screening has also been canceled." If only I had a copy, I'd like to host a viewing party here in Austin for The Interview, which I want to see now more than ever. (And it would be a fitting venue.)
Australia

Australia Moves Toward New Restrictions On Technology Export and Publication 89

Posted by timothy
from the locked-file-cabinet-in-the-basement dept.
An anonymous reader writes Australia is starting a public consultation process for new legislation that further restricts the publication and export of technology on national security grounds. The public consultation starts now (a few days before Christmas) and it is due by Jan 30th while a lot of Australians are on holidays. I don't have the legal expertise to dissect the proposed legislation, but I'd like some more public scrutiny on it. I find particularly disturbing the phrase "The Bill includes defences that reverse the onus of proof which limit the right to be presumed innocent until proven guilty" contained in this document, also available on the consultation web site.
Crime

Did Alcatraz Escapees Survive? Computer Program Says They Might Have 87

Posted by timothy
from the like-to-think-so dept.
In June of 1962, three prisoners escaped the penitentary on Alcatraz, in an elaborate plot that was dramatized in a Clint Eastwood movie. A question that has long puzzled the public is whether these men ever made it to shore; the many factors that made Alcatraz a secure prison include sharks, cold water, and contrary currents. Still, some artifacts from the attempt, and perhaps the appeal of stories about survival against high odds, have led many people to believe that the men actually landed safely and faded into society. coondoggie writes This week Dutch scientists from Delft University of Technology presented findings from a computer modeling program they were working on, unrelated to the mystery, that demonstrated the escapees could have survived the journey. "In hindsight, the best time to launch a boat from Alcatraz was [11:30 am], one and a half hours later than has generally been assumed. A rubber boat leaving Alcatraz at [11:30 am] would most likely have landed just north of the Golden Gate Bridge. The model also shows that debris in that scenario would be likely to wash up at Angel Island, exactly where one of the paddles and some personal belongings were found.
Censorship

Reaction To the Sony Hack Is 'Beyond the Realm of Stupid' 566

Posted by timothy
from the pretty-jaw-dropping dept.
rossgneumann writes North Korea may really be behind the Sony hack, but we're still acting like idiots. Peter W. Singer, one of the nations foremost experts on cybersecurity, says Sony's reaction has been abysmal. "Here, we need to distinguish between threat and capability—the ability to steal gossipy emails from a not-so-great protected computer network is not the same thing as being able to carry out physical, 9/11-style attacks in 18,000 locations simultaneously. I can't believe I'm saying this. I can't believe I have to say this."
Crime

Councilmen Introduce Bills Strongly Regulating UAV Use in NYC 68

Posted by timothy
from the man-vs-the-state dept.
SternisheFan passes on this excerpt from an Ars Technica article: On Wednesday Councilman Dan Garodnick introduced a bill to the New York City council seeking to ban all use of drones except those operated by police officers who obtain warrants. A second, parallel bill introduced by councilman Paul Vallone would place more stringent restrictions on drone use but stop short of banning drones for hobbyists and companies altogether. Both bills have been passed to the city's committee on public safety. An all-out ban on drones within the metropolis would be a quite wide-reaching step, especially as the Federal Aviation Authority (FAA) seems poised to adopt more permissive rules, with respect to commercial interests in particular. Earlier this year, the FAA formally granted six Hollywood companies exemptions to drone ban rules. A couple of months later, the FAA granted similar exemptions for construction site monitoring and oil rig flare stack inspections. The article explains that Vallone's bill is less restrictive, and rather than propose an outright ban "lists 10 instances where operating a UAV would be illegal, including at night, out of the operator's eyesight, or above 400 ft high. Outside of those conditions, hobbyists and commercial interests would be free to fly drones."
Crime

RFID-Blocking Blazer and Jeans Could Stop Wireless Identity Theft 110

Posted by samzenpus
from the keeping-it-in dept.
An anonymous reader writes A pair of trousers and blazer have been developed by San Francisco-based clothing company Betabrand and anti-virus group Norton that are able to prevent identity theft by blocking wireless signals. The READY Active Jeans and the Work-It Blazer contain RFID-blocking fabric within the pockets' lining designed to prevent hacking through radio frequency identification (RFID) signals emitted from e-passports and contactless payment card chips. According to the clothing brand, this form of hacking is an increasing threat, with "more than 10 million identities digitally pick pocketed every year [and] 70% of all credit cards vulnerable to such attacks by 2015."
Australia

Over 9,000 PCs In Australia Infected By TorrentLocker Ransomware 83

Posted by samzenpus
from the cash-for-corrupted-computers dept.
First time accepted submitter River Tam writes Cybercriminals behind the TorrenLocker malware may have earned as much as $585,000 over several months from 39,000 PC infections worldwide, of which over 9,000 were from Australia. If you're a Windows user in Australia who's had their files encrypted by hackers after visiting a bogus Australia Post website, chances are you were infected by TorrentLocker and may have contributed to the tens of thousands of dollars likely to have come from Australia due to this digital shakedown racket.
Google

Google Strikes Deal With Verizon To Reduce Patent Troll Suits 20

Posted by samzenpus
from the why-can't-we-be-friends? dept.
mpicpp writes Google Inc. and Verizon Communications Inc. struck a long-term patent cross-license agreement to reduce the risk of future patent lawsuits, the latest in a string of deals that signal a slowdown after years of aggressive patent wars. The deal effectively bars the companies from suing each other over any of the thousands of patents the companies currently own or acquire in the next five years. It also protects the companies if either sells a patent to another company, and that company attempts a lawsuit. "This cross license allows both companies to focus on delivering great products and services to consumers around the world," said Kirk Dailey, Google's head of patent transactions.

Man will never fly. Space travel is merely a dream. All aspirin is alike.

Working...