Note: You can take 10% off all Slashdot Deals with coupon code "slashdot10off." ×
Security

Symantec Researchers Find 49 New Modules of Regin Spying Tool 20

itwbennett writes: Security researchers from Symantec have identified 49 more modules (bringing the total number found so far to 75) of the sophisticated Regin cyberespionage platform that many believe is used by the U.S. National Security Agency and its close allies. Some of the modules implement basic malware functions, while other modules are much more specialized and built with specific targets in mind. 'One module was designed to monitor network traffic to Microsoft Internet Information Services (IIS) web servers, another was observed collecting administration traffic for mobile telephony base station controllers, while another was created specifically for parsing mail from Exchange databases,' the Symantec researchers said in an updated version of their white paper (PDF) published Thursday.
Businesses

Ask Slashdot: Advice On Enterprise Architect Position 189

dave562 writes: I could use some advice from the community. I have almost 20 years of IT experience, 5 of it with the company I am currently working for. In my current position, the infrastructure and applications that I am responsible for account for nearly 80% of the entire IT infrastructure of the company. In broad strokes our footprint is roughly 60 physical hosts that run close to 1500 VMs and a SAN that hosts almost 4PB of data. The organization is a moderate sized (~3000 employees), publicly traded company with a nearly $1 billion market value (recent fluctuations not withstanding).

I have been involved in a constant struggle with the core IT group over how to best run the operations. They are a traditional, internal facing IT shop. They have stumbled through a private cloud initiative that is only about 30% realized. I have had to drag them kicking and screaming into the world of automated provisioning, IaaS, application performance monitoring, and all of the other IT "must haves" that a reasonable person would expect from a company of our size. All the while, I have never had full access to the infrastructure. I do not have access to the storage. I do not have access to the virtualization layer. I do not have Domain Admin rights. I cannot see the network.

The entire organization has been ham strung by an "enterprise architect" who relies on consultants to get the job done, but does not have the capability to properly scope the projects. This has resulted in failure after failure and a broken trail of partially implemented projects. (VMware without SRM enabled. EMC storage hardware without automated tiering enabled. Numerous proof of concept systems that never make it into production because they were not scoped properly.)

After 5 years of succeeding in the face of all of these challenges, the organization has offered me the Enterprise Architect position. However they do not think that the position should have full access to the environment. It is an "architecture" position and not a "sysadmin" position is how they explained it to me. That seems insane. It is like asking someone to draw a map, without being able to actually visit the place that needs to be mapped.

For those of you in the community who have similar positions, what is your experience? Do you have unfettered access to the environment? Are purely architectural / advisory roles the norm at this level?
Operating Systems

Contiki 3.0 Released, Retains Support For Apple II, C64 43

An anonymous reader writes that on Wednesday the Contiki team announced the release of Contiki 3.0, the latest version of the open source IoT operating system. The 3.0 release is a huge step up from the 2.x branch and brings support for new and exciting hardware, a set of new network protocols, a bunch of improvements in the low-power mesh networking protocols, along with a large number of general stability improvements. And, yes, the system still runs on the Commodore 64/128, Apple II, Atari.
Android

Since-Pulled Cyanogen Update For Oneplus Changes Default Home Page To Bing 84

ourlovecanlastforeve writes: Nestled into GSMArena's report on the Cyanogen OS 12.1 update for Oneplus [ Note: an update that the story reports has since been pulled.] is this tasty bite: "...you'll find out that your Chrome homepage has been changed to Bing." Then it's casually dismissed with "Thankfully though, you can easily get rid of Microsoft's search engine by using Chrome settings." as if this were the most normal thing to have to do after an OTA update. Is this the new normal? Has Microsoft set a new precedent that it's okay to expect users to have to go searching through every setting and proactively monitor network traffic to make sure their data isn't being stolen, modified or otherwise manipulated?
Censorship

"Sensationalized Cruelty": FCC Complaints Regarding Game of Thrones 193

v3rgEz writes: As a cable channel, the FCC has little to no jurisdiction over HBO's content. That doesn't stop people from complaining to them about them, however, and after a FOIA request, the FCC released numerous complaints regarding the network's Game of Thrones. While there were the usual and expected lamentations about 'open homosexual sex acts,' other users saw Game of Thrones as a flashpoint in the war of Net Neutrality.
IBM

IBM Tells Administrators To Block Tor On Security Grounds 69

Mickeycaskill writes: IBM says Tor is increasingly being used to scan organizations for flaws and launch DDoS, ransomware and other attacks. Tor, which provides anonymity by obscuring the real point of origin of Internet communications, was in part created by the US government, which helps fund its ongoing development, due to the fact that some of its operations rely on the network. However, the network is also widely used for criminal purposes. A report by the IBM says administrators should block access to Tor , noting a "steady increase" an attacks originating from Tor exit nodes, with attackers increasingly using Tor to disguise botnet traffic. "Spikes in Tor traffic can be directly tied to the activities of malicious botnets that either reside within the Tor network or use the Tor network as transport for their traffic," said IBM. "Allowing access between corporate networks and stealth networks can open the corporation to the risk of theft or compromise, and to legal liability in some cases and jurisdictions."
Wireless Networking

Massachusetts Boarding School Sued Over Wi-Fi Sickness 583

alphadogg writes: The parents of an anonymous student at the Fay School in Southborough, Mass., allege that the Wi-Fi at the institution is making their child sick, according to a lawsuit filed in U.S. District Court earlier this month (PDF). The child, identified only as "G" in court documents, is said to suffer from electromagnetic hypersensitivity syndrome. The radio waves emitted by the school's Wi-Fi routers cause G serious discomfort and physical harm, according to the suit. "After being continually denied access to the school in order to test their student's classroom, and having their request that all classrooms in which their child is present have the WiFi network replaced with a hard-wired Ethernet denied, the parents sued under the Americans with Disabilities Act."
Networking

Virgin Media To Base a Public Wi-Fi Net On Paying Customers' Routers 112

An anonymous reader writes with a story that Virgin Media "announced this month its plans to roll out a free public WiFi network this autumn, using subscribers' personal routers and existing infrastructure to distribute the service across UK cities." And while regular customers' routers are to be the basis of the new network, the publicly viewable overlay would operate over "a completely separate connection," and the company claims subscribers' performance will not be hindered. Why, then, would customers bother to pay? For one thing, because the free version is slow: 0.5Mbps, vs. 10Mbps for Virgin's customers.
Businesses

Comcast Planning Gigabit Cable For Entire US In 2-3 Years 253

An anonymous reader writes: Robert Howald, Comcast's VP of network architecture, said the company is hoping to upgrade its entire cable network within the next two years. The upgraded DOCSIS 3.1 network can support maximum speeds of 10 Gpbs. "Our intent is to scale it through our footprint through 2016," Howald said. "We want to get it across the footprint very quickly... We're shooting for two years."
Advertising

Why Google Wants To Sell You a Wi-Fi Router 198

lpress writes: Last quarter, Google made $16 billion on advertising and $1.7 billion on "other sales." I don't know how "other sales" breaks down, but a chunk of that is hardware devices like the Pixel Chromebook, Chromecast, Next thermostat, Nexus phone and, now, WiFi routers. Does the world need another $200 home router? Why would Google bother? I can think of a couple of strategic reasons — they hope it will become a home-automation hub (competing with the Amazon Echo) and it will enable them to dynamically configure and upgrade your home or small office network for improved performance (hence more ads).
Intel

Intel's Collaborative Cancer Cloud, an Open Platform For Genome-Based Treatments 16

Lucas123 writes: Intel and the Knight Cancer Institute have announced what will be an open-source service platform, called the Collaborative Cancer Cloud. The platform will enable healthcare facilities to securely share patient genomic data, radiological imagery and other healthcare-related information for precision treatment analysis. Key to averting HIPAA privacy issues will be Intel's Trusted Execution Technology, its embedded server encryption hardware that tests the authenticity of a platform and its operating system before sharing data. Intel said it will be opening that technology up for use by any clinic that want to take part in the Collaborative Cancer Cloud or to build its own data-sharing network with healthcare partners. Dr. Brian Druker, director of the Knight Cancer Institute, said the Trusted Execution Technology will allow healthcare centers to maintain control of patient data, while also allowing clinics around the world to use it for vastly faster genomic analysis.
Encryption

Engaging Newbies In Email Encryption and Network Privacy 81

reifman writes: All six parts of my series introducing beginners to PGP encryption and network privacy are now freely available. I hope it's useful for Slashdot readers to share with their less-technical acquaintances. There's an introduction to PGP, a guide to email encryption on the desktop, smartphone and in the browser, an introduction to the emerging key sharing and authentication startup, Keybase.io, and an intro to VPNs. There's a lot more work for us to do in the ease of use of communications privacy but this helps people get started more with what's available today.
Bitcoin

Bitcoin Fork Divides Community 185

HughPickens.com writes: The Bitcoin community is facing one of the most momentous decisions in its six-year history. The Bitcoin network is running out of spare capacity, and two increasingly divided camps disagree about what, if anything, to do about the problem. The technical issue is that a block, containing a record of recent transactions, currently has a 1MB limit. Increasing the block size would allow more transactions on the network at once, helping it to scale up to meet growing demand. But it would also make it more difficult for ordinary users to host full network "nodes" that validate new transactions on the network, potentially making the digital currency more centralized as a result. Now Rob Price writes that two high-profile developers have released a competing version of the codebase that risks splitting the digital currency in two.

Gavin Andresen and Mike Hearn have released Bitcoin XT, an alternative version of the core software that supports increasing the block size when required. Bitcoin users will now be forced to decide between "Bitcoin Core" and Bitcoin XT, raising the prospect of a "fork," where the digital currency divides into two competing versions. According to Price, Core and XT are compatible right now. However, if XT is adopted by 75% of users by January 2016, it will upgrade to a larger block size that will be incompatible with Core — meaning that if the other 25% don't then choose to convert, it will effectively split the currency into two. So far, 7.7% of the network has adopted XT, according to website XTnodes.com. "Ultimately, how the dispute is resolved may matter more than the specific decision that's reached," says Timothy B. Lee. "If the community is ultimately able to reach a consensus, the process could become a template for resolving future disagreements. On the other hand, if disagreements fester for months — or, worse, if a controversial software change splits the Bitcoin network into two warring camps — it could do real damage to Bitcoin's reputation."
Google

Google Announces a Router: OnHub 275

An anonymous reader writes: Google has announced they're working with TP-LINK to build a new router they call OnHub. They say it's designed for the way we tend to use Wi-Fi in 2015, optimizing for streaming and sharing in a way that older routers don't. The router has a cylindrical design and comes with a simple, user-friendly mobile app. They say, "OnHub searches the airwaves and selects the best channel for the fastest connection. A unique antenna design and smart software keep working in the background, automatically adjusting OnHub to avoid interference and keep your network at peak performance. You can even prioritize a device, so that your most important activity — like streaming your favorite show — gets the fastest speed." The device will cost $200, it supports Bluetooth Smart Ready, Weave, and 802.15.4, and it will automatically apply firmware updates.
Programming

"Father Time" Gets Another Year At NTP From Linux Foundation 157

dkatana writes: Harlan Stenn, Father Time to some and beleaguered maintainer of the Network Time Protocol (NTP) to others, will stay working for the NTP another year. But there is concern that support will decline as more people believe that NTP works just fine and doesn't need any supervision. NTP is the preeminent time synchronization system for Macs, Windows, and Linux computers and most servers on networks. According to IW, for the last three-and-a-half years, Stenn said he's worked 100-plus hours a week answering emails, accepting patches, rewriting patches to work across multiple operating systems, piecing together new releases, and administering the NTP mailing list. If NTP should get hacked or for some reason stop functioning, hundreds of thousands of systems would feel the consequences. "If that happened, all the critics would say, 'See, you can't trust open source code,'" said Stenn.
Security

How an Obscure Acronym Helped Link AT&T To NSA Spying 54

netbuzz writes: Slashdot on Saturday highlighted a story by Pro Publica and the New York Times that used Snowden documents to reveal previously unknown details of the "highly collaborative" relationship between AT&T and the NSA that enabled the latter's controversial Internet surveillance program. An aspect of the story that received only passing mention was how the reporters connected an acronym for an obscure proprietary network configuration – SNRC — to AT&T and the NSA in part through a 1996 story in the now-defunct print version of Network World. In essence, that acronym proved to be a fingerprint confirming the connection — and its match was found thanks to Google Books.
Network

The Network Is Hostile 124

An anonymous reader writes: Following this weekend's news that AT&T was as friendly with the NSA as we've suspected all along, cryptographer Matthew Green takes a step back to look at the broad lessons we've learned from the NSA leaks. He puts it simply: the network is hostile — and we really understand that now. "My take from the NSA revelations is that even though this point was 'obvious' and well-known, we've always felt it more intellectually than in our hearts. Even knowing the worst was possible, we still chose to believe that direct peering connections and leased lines from reputable providers like AT&T would make us safe. If nothing else, the NSA leaks have convincingly refuted this assumption." Green also points out that the limitations on law enforcement's data collection are technical in nature — their appetite for surveillance would be even larger if they had the means to manage it. "...it's significant that someday a large portion of the world's traffic will flow through networks controlled by governments that are, at least to some extent, hostile to the core values of Western democracies."
The Military

F-35 Might Be Outperformed By Fourth-Generation Fighters 732

savuporo writes: Defensetech.org posted a story relaying a report from National Security Network titled "Thunder without Lightning: The High Costs and Limited Benefits of the F-35 Program". According to the story, F-35 is outperformed or showing only slight advantages in simulations and limited real-life tests by decades old 4th-generation fighters like F-16 and F18, but also MiG-29 Fulcrum and Su-27 Flanker, that are of course made by Russia and latter also produced in China. The story also refers back to earlier report last month of F-35 performing poorly in dogfights. "In one simulation subcontracted by the RAND Corporation, the F-35 incurred a loss exchange ratio of 2.4–1 against Chinese Su-35s. That is, more than two F-35s were lost for each Su-35 shot down."
Communications

New Rules From the FCC Open Up New Access To Wi-Fi 64

CarlottaHapsburg writes: White space — unused channels in the VHF and UHF spectrum — is already part of daily life, from old telephones to going online at your coffee shop or plugging in baby monitors. The time has come to 'permit unlicensed fixed and personal/portable white space devices and unlicensed wireless microphones to use channels in the 600 MHz and television broadcast bands,' according to the FCC. One of the ramifications is that Wi-Fi could now blanket urban areas, as well as bringing it to rural areas and machine-to-machine technology. Rice University has tested a super Wi-Fi network linked by next-generation TV or smart remotes. Carriers are sure to be unhappy about this, but consumers will have the benefit of a newly open web.