Hackin9
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Large parts of a public Wi-Fi network built by Google in Mountain View, California, don't work properly and, according to local residents, haven't worked for months.
 
Nvidia is expecting Tegra chip revenue to drop by as much as 40 percent this year, with the company indirectly blaming Microsoft's Windows RT OS for the decline.
 
An email provider reportedly used by former NSA contractor Edward Snowden shut down on Thursday, citing an ongoing court battle that it could not discuss.
 
NASA launched a $1.5 million competition to see who can build the best space robot.
 
While resistive RAM's chances of crowding out NAND flash anytime soon are slim, the coming RAM wars mean mobile users are likely to have hundreds of gigabytes, or even a terabyte, of storage at their fingertips.
 
LinuxSecurity.com: New mozilla-firefox packages are available for Slackware 13.37, 14.0, and -current to fix security issues. [More Info...]
 
LinuxSecurity.com: New mozilla-thunderbird packages are available for Slackware 13.37, 14.0, and -current to fix security issues. [More Info...]
 
LinuxSecurity.com: New seamonkey packages are available for Slackware 14.0, and -current to fix security issues. [More Info...]
 
LinuxSecurity.com: An updated thunderbird package that fixes several security issues is now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having [More...]
 
Inexpensive F-BOMB sensors that form CreepyDOL, a distributed network for stalking people using mobile Wi-Fi devices.

You may not know it, but the smartphone in your pocket is spilling some of your deepest secrets to anyone who takes the time to listen. It knows what time you left the bar last night, the number of times per day you take a cappuccino break, even the dating website you use. And because the information is leaked in dribs and drabs, no one seems to notice. Until now.

Enter CreepyDOL, a low-cost, distributed network of Wi-Fi sensors that stalks people as they move about neighborhoods or even entire cities. At 4.5 inches by 3.5 inches by 1.25 inches, each node is small enough to be slipped into a wall socket at the near-by gym, cafe, or break room. And with the ability for each one to share the Internet traffic it collects with every other node, the system can assemble a detailed dossier of personal data, including the schedules, e-mail addresses, personal photos, and current or past whereabouts of the person or people it monitors.

Short for Creepy Distributed Object Locator, CreepyDOL is the brainchild of 27-year-old Brendan O'Connor, a law student at the University of Wisconsin at Madison and a researcher at a consultancy called Malice Afterthought. After a reading binge of science fiction novels, he began wondering how the growing ubiquity of mobile computing was affecting people's ability to remain anonymous, or at least untracked or unidentified, as they went about their work and social routines each day.

Read 10 remaining paragraphs | Comments

    


 
Microsoft will deliver eight security updates next week to patch dangerous vulnerabilities in Internet Explorer and the business-critical Exchange Server, as well as less-serious bugs in all versions of Windows.
 
Dropping the veil of secrecy over Office 365 uptime, Microsoft has released availability data for each of the past four quarters and is celebrating the results.
 
Twitter has announced a new program to analyze some users' activity on the site to give marketers better information about how companies' tweets impact sales in physical stores.
 
YouTube co-founders Chad Hurley and Steve Chen, launched the Mixbit.com website andapp, that together enable users to shoot, edit and stitch together videos that can be uploaded to the site and remixed.
 
Dropping the veil of secrecy over Office 365 uptime, Microsoft has released availability data for each of the past four quarters and is celebrating the results.
 
Taking a page from Twitter, Facebook is testing Trending Topics, which tracks what topics users are talking about most on the social network.
 
 
Delphi CIO Tim McCabe discusses how he navigated the auto-parts maker through times of major financial struggle and how, as a result, IT has become a driver of revenue. McCabe also explores why CIOs and IT leaders need to be more knowledgeable about their businesses and what the future of offshoring and out-tasking looks like.
 
Samsung Electronics faces the possibility of U.S. import bans on some of its smartphones in two separate cases brought by Apple, with major steps happening Friday.
 
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Oracle has moved quickly to provide virtualization support for its recently released 12c database, saying this week that a set of virtual machine templates for the product are now available.
 
As a new school year approaches, Box is hoping to march into more campuses right alongside students and teachers with its cloud storage and file sharing application.
 
Canonical lowered the price of its Ubuntu smartphone to $695 from $775 in a bid to reach its lofty $32 million crowdfunding goal in the next two weeks.
 
[security bulletin] HPSBHF02912 rev.1 - HP Networking Products including H3C and 3COM Routers and Switches, OSPF Remote Information Disclosure and Denial of Service
 
OUTDATED, UNSUPPORTED and VULNERABLE 3rd party components installed with Exact Audio Copy
 
As 30-somethings go back to college to earn a first or a new degree, they sometimes need a bit of a confidence boost to re-engage with learning. At Kaplan University, students are rewarded with badges and higher rankings on leaderboards as they master skills and accomplish goals.
 
Pinterest has evolved to become more than a spot for food and fashion. It's a now popular place for businesses. Pinterest's head of infrastructure shares 11 tips on how technology professionals can get the most out of the online bulletin (or "pin") board.
 
Joomla! redSHOP component v1.2 SQL Injection
 
Re: Re: [Full-disclosure] Apache suEXEC privilege elevation / information disclosure
 
Following up on work commissioned by the U.S. Defense Advanced Research Projects Agency (DARPA), IBM has developed a programming paradigm, and associated simulator and basic software library, for its experimental SyNAPSE processor.
 
T-Mobile US had 1.1 million net customer additions in the second quarter, as customers backed its new no-contract plans.
 
For generations, office ergonomics involved various measures intended to keep employees productive while they remained in their chairs. New thinking and new devices are changing all that.
 
Huawei Technologies is bringing its own "software-defined networking" switch globally in a bid to raise its profile and expand in a market dominated by Cisco.
 
Five book publishers have objected to restrictions that would be placed on Apple's business after it was found guilty last month of conspiring to fix prices for e-books.
 
Yahoo is revamping its logo. The company began a 30-day run of rolling out a new logo every day until it unveils the official symbol at midnight ET Sept. 5.
 
[slackware-security] mozilla-thunderbird (SSA:2013-219-02)
 
[slackware-security] seamonkey (SSA:2013-219-03)
 
[slackware-security] mozilla-firefox (SSA:2013-219-01)
 
HP Data Protector Arbitrary Remote Command Execution
 
Two Vulnerabilities in NetworkMiner : DLL Hijacking + Directory Traversal
 
Sungard's mobile office is designed to work in areas where nothing else is working. It is for use in places where there is no power or network. It's for disaster zones.
 
NASA engineers are still making efforts to get the crippled Kepler Space Telescope working again, but they're also seeking alternative plans in case that doesn't happen.
 

肩、腕、クラブヘッドの動きのベクトルを 一致させつつも、G25アイアンクラブヘッドを望ましいアングルからインパクト・ゾーンに入れ、mp700 アイアン絶妙なタイミングで クラブを リリースさせることが出来るのである。

 
D-Link DIR-600 and DIR-300 Multiple Security Vulnerabilities
 
Internet Storm Center Infocon Status