Critical Zen Cart Vulnerability Could Spell Black Friday Disaster For Shoppers

Mark Wilson writes: It’s around this time of year, with Black Friday looming and Christmas just around the corner, that online sales boom. Today security firm High-Tech Bridge has issued a warning to retailers and shoppers about a critical vulnerability in the popular Zen Cart shopping management system. High-Tech Bridge has provided Zen Cart with full details of the security flaw which could allow remote attackers to infiltrate web servers and gain access to customer data. Servers running Zen Cart are also at risk of malware, meaning that hundreds of thousands of ecommerce sites pose a potential danger. Technical details of the vulnerability are not yet being made public, but having notified Zen Cart of the issue High-Tech Bridge says the date of full public disclosure is 16 December. Read more of this story at Slashdot.

More:
Critical Zen Cart Vulnerability Could Spell Black Friday Disaster For Shoppers

Scientists Produce Graphene 100 Times Cheaper Than Ever Before

Zothecula writes that researchers at the University of Glasgow have found a way to produce large sheets of graphene 100 times more cheaply than previous methods. Gizmag reports: “Since first being synthesized by Andre Geim and Kostya Novoselov at the University of Manchester in 2004, there has been an extensive effort to exploit the extraordinary properties of graphene. However the cost of graphene in comparison to more traditional electronic materials has meant that its uptake in electronic manufacturing has been slow. Now researchers at the University of Glasgow have discovered a way to create large sheets of graphene using the same type of cheap copper used to manufacture lithium-ion batteries.” Read more of this story at Slashdot.

Continued here:
Scientists Produce Graphene 100 Times Cheaper Than Ever Before

A Skeptic’s Guide to Buying (or Not Buying) a 4K TV

I bought my beloved television half a decade ago, a (then) impressively thin 32-inch Samsung for around $500 . Today, you can buy a 50-inch 4K TV for $500 . The real question is: Should you buy a 4K TV at all? Read more…

Read More:
A Skeptic’s Guide to Buying (or Not Buying) a 4K TV

Sued Freelancer Allegedly Turns Over Contractee Source Code In Settlement

FriendlySolipsist writes: Blizzard Entertainment has been fighting World of Warcraft bots for years. TorrentFreak reports that Bossland, a German company that operates “buddy” bots, alleges Blizzard sued one of its freelancers and forced a settlement. As part of that settlement, the freelancer allegedly turned over Bossland’s source code to Blizzard. In Bossland’s view, their code was “stolen” by Blizzard because it was not the freelancer’s to disclose. This is a dangerous precedent for freelance developers in the face of legal threats: damned if you do, damned if you don’t. Read more of this story at Slashdot.

View article:
Sued Freelancer Allegedly Turns Over Contractee Source Code In Settlement

TrueCrypt Safer Than Previously Thought

An anonymous reader writes: Back in September, members of Google’s Project Zero team found a pair of flaws in the TrueCrypt disk encryption software that could lead to a system compromise. Their discovery raised concerns that TrueCrypt was unsuitable for use in securing sensitive data. However, the Fraunhofer Institute went ahead with a full audit of TrueCrypt’s code, and they found it to be more secure than most people think. They correctly point out that for an attacker to exploit the earlier vulnerabilities (and a couple more vulnerabilities they found themselves), the attacker would already need to have “far-reaching access to the system, ” with which they could do far worse things than exploit an obscure vulnerability. The auditors say, “It does not seem apparent to many people that TrueCrypt is inherently not suitable to protect encrypted data against attackers who can repeatedly access the running system. This is because when a TrueCrypt volume is mounted its data is generally accessible through the file system, and with repeated access one can install key loggers etc. to get hold of the key material in many situations. Only when unmounted, and no key is kept in memory, can a TrueCrypt volume really be secure.” For other uses, the software “does what it’s designed for, ” despite its code flaws. Their detailed, 77-page report (PDF) goes into further detail. Read more of this story at Slashdot.

See more here:
TrueCrypt Safer Than Previously Thought

Researchers Create Plant-Circuit Hybrid

sciencehabit writes: Researchers have crafted flexible electronic circuits inside a rose. Eventually such circuitry may help farmers eavesdrop on their crops and even control when they ripen. The advance may even allow people to harness energy from trees and shrubs not by cutting them down and using them for fuel, but by plugging directly into their photosynthesis machinery. The researchers used “an organic electronic building block called PEDOT-S:H. Each of these building blocks consists of a short, repeating chain of a conductive organic molecule with short arms coming off each link of the chain. Each of the arms sports a sulfur-containing group linked to a hydrogen atom. Berggren’s group found that when they placed them in the water, the rose stems readily pulled the short polymer chains up the xylem channels (abstract). … The upshot was that the myriad short polymer chains quickly linked themselves together into continuous strings as long as 10 centimeters. The researchers then added electronic probes to opposite ends of these strings, and found that they were, in fact, wires, conducting electricity all down the line.” Read more of this story at Slashdot.

Excerpt from:
Researchers Create Plant-Circuit Hybrid

Sony Quietly Adds PS2 Emulation To the PS4

An anonymous reader writes: The Digital Foundry blog reports that Sony has added functionality to the PlayStation 4 that allows it to act as an emulator for some PlayStation 2 games. Surprisingly, the company did not mention that this functionality is live; a new Star Wars game bundle just happened to include three titles that were released on the PS2. From the article: “How can we tell? First of all, a system prompt appears telling you that select and start buttons are mapped to the left and right sides of the Dual Shock 4’s trackpad. Third party game developers cannot access the system OS in this manner. Secondly, just like the PS2 emulator on PlayStation 3, there’s an emulation system in place for handling PS2 memory cards. Thirdly, the classic PlayStation 2 logo appears in all of its poorly upscaled glory when you boot each title.” Sony has confirmed the games are being emulated, but declined to provide any further details. Read more of this story at Slashdot.

View article:
Sony Quietly Adds PS2 Emulation To the PS4

The Next Gold Rush Will Be 5,000 Feet Under the Sea, With Robot Drones

merbs writes: In Papua New Guinea, one well-financed, first-mover company is about to pioneer deep sea mining. And that will mean dispatching a fleet of giant remote-operated robotic miners 5, 000 feet below the surface to harvest the riches scattered across ocean floor. These mammoth underwater vehicles look like they’ve been hauled off the set of a sci-fi film—think Avatar meets The Abyss. And they’ll be dredging up copper, gold, and other valuable minerals, far beneath the gaze of human eyes. Read more of this story at Slashdot.

Continued here:
The Next Gold Rush Will Be 5,000 Feet Under the Sea, With Robot Drones

US Navy Is Planning To Launch a Squadron of Underwater Drones By 2020

Hallie Siegel writes: According to the non-profit Autonomous Undersea Vehicle Applications Center, there are over 250 different configurations of unmanned undersea vehicles (UUVs) in service today. That number is likely to grow in the coming years as the technology improves — note that the US Navy has made UUVs a priority and is planning to launch a whole squadron of them by 2020. Dan Gettinger from the Center for the Study of the Drone at Bard College gives an overview of this technology. Read more of this story at Slashdot.

More:
US Navy Is Planning To Launch a Squadron of Underwater Drones By 2020

Police Body Cameras Come With Pre-Installed Malware

An anonymous reader writes: The old Conficker worm was found on new police body cameras that were taken out of the box by security researchers from iPower Technologies. The worm is detected by almost all security vendors, but it seems that it is still being used because modern day IoT devices can’t yet run security products. This allows the worm to spread, and propagate to computers when connected to an unprotected workstation. One police computer is enough to allow attackers to steal government data. The source of the infection is yet unknown. It is highly unlikely that the manufacturer would do this. Middleman involved in the shipping are probably the cause. Read more of this story at Slashdot.

View article:
Police Body Cameras Come With Pre-Installed Malware