Open Source Router Firmware OpenWRT 15.05 Released

aglider writes: The newest stable iteration of the famous and glorious OpenWRT has just been released in the wild for all the supported architectures. The latest version is 15.05, codenamed “Chaos Calmer” after a cocktail drink, just like all previous ones. Major changes from the official announcements: “Linux kernel updated to version 3.18. Improved Security Features. Rewritten package signing architecture based on ed25519. Added support for jails. Added support for hardened builds. Improved Networking Support. Platform and Driver Support.” For the full details you are welcome on the forums while the firmware itself and extra packages are available from the distribution servers. Read more of this story at Slashdot.

Continue reading here:
Open Source Router Firmware OpenWRT 15.05 Released

First Library To Support Anonymous Internet Browsing Halts Project After DHS Email

An anonymous reader writes with an update to the news we discussed in July that a small library in New Hampshire would be used as a Tor exit relay. Shortly after the project went live, the local police department received an email from the Department of Homeland Security. The police then met with city officials and discussed all the ways criminals could make use of the relay. They ultimately decided to suspend the project, pending a vote of the library board of trustees on Sept. 15. DHS spokesman Shawn Neudauer said the agent was simply providing “visibility/situational awareness, ” and did not have any direct contact with the Lebanon police or library. “The use of a Tor browser is not, in [or] of itself, illegal and there are legitimate purposes for its use, ” Neudauer said, “However, the protections that Tor offers can be attractive to criminal enterprises or actors and HSI [Homeland Security Investigations] will continue to pursue those individuals who seek to use the anonymizing technology to further their illicit activity.” …Deputy City Manager Paula Maville said that when she learned about Tor at the meeting with the police and the librarians, she was concerned about the service’s association with criminal activities such as pornography and drug trafficking. “That is a concern from a public relations perspective and we wanted to get those concerns on the table, ” she said. Read more of this story at Slashdot.

More:
First Library To Support Anonymous Internet Browsing Halts Project After DHS Email

GM Performs Stealth Update To Fix Security Bug In OnStar

An anonymous reader writes: Back in 2010, long before the Jeep Cherokee thing, some university researchers demonstrated remote car takeover via cellular (old story here). A new Wired article reveals that this was actually a complete exploit of the OnStar system (and was the same one used in that 60 Minutes car hacking episode last year). Moreover, these cars stayed vulnerable for years — until 2014, when GM created a remote update capability and secretly started pushing updates to all the affected cars. Read more of this story at Slashdot.

Read the original post:
GM Performs Stealth Update To Fix Security Bug In OnStar

Vietnam’s Tech Boom: a Look Inside Southeast Asia’s Silicon Valley

rjmarvin writes: Vietnam is in the midst of a tech boom. The country’s education system is graduating thousands of well-educated software engineers and IT professionals each year, recruited by international tech companies like Cisco, Fujitsu, HP, IBM, Intel, LG, Samsung, Sony, Toshiba and others setting up shop in the southern tech hub of Ho Chi Minh City and the central coastal city of Da Nang. Young Vietnamese coders and entrepreneurs are also launching more and more startups, encouraged by government economic policies encouraging small businesses and a growing culture around innovation in the country. Read more of this story at Slashdot.

Link:
Vietnam’s Tech Boom: a Look Inside Southeast Asia’s Silicon Valley

Hackers Abuse Satellite Internet Links To Remain Anonymous

msm1267 writes: Poorly secured satellite-based Internet links are being abused by nation-state hackers, most notably by the Turla APT group, to hide command-and-control operations, researchers at Kaspersky Lab said today. Active for close to a decade, Turla’s activities were exposed last year; the Russian-speaking gang has carried out espionage campaigns against more than 500 victims in 45 countries, most of those victims in critical areas such as government agencies, diplomatic and military targets, and others. Its use of hijacked downstream-only links is a cheap ($1, 000 a year to maintain) and simple means of moving malware and communicating with compromised machines, Kaspersky researchers wrote in a report. Those connections, albeit slow, are a beacon for hackers because links are not encrypted and ripe for abuse. Read more of this story at Slashdot.

View the original here:
Hackers Abuse Satellite Internet Links To Remain Anonymous

Why AltaVista Lost Ground To Google Sooner Than Expected

techtsp writes: Marcia J. Bates, UCLA Professor Emerita of Information Studies recently explained why Google’s birth led to the downfall of AltaVista. According to Bates, early search engines including AltaVista adapted the classical IR methods. At the other hand, Google founders started off with a completely different approach in mind. Google successfully recognized the potential of URLs, which could be added to the algorithms for the sake of information indexing altogether. Google’s modern age techniques were a huge boost to those older techniques. Whatever other business and company management issues AltaVista faced, it was the last of the old style information retrieval engines. Read more of this story at Slashdot.

View article:
Why AltaVista Lost Ground To Google Sooner Than Expected

Shuttleworth Says Snappy Won’t Replace .deb Linux Package Files In Ubuntu 15.10

darthcamaro writes: Mark Shuttleworth, BDFL of Ubuntu is clearing the air about how Ubuntu will make use of .deb packages even in an era where it is moving to its own Snappy (‘snaps’) format of rapid updates. Fundamentally it’s a chicken and egg issue. From the serverwatch article: “‘We build Snappy out of the built deb, so we can’t build Snappy unless we first build the deb, ‘ Shuttleworth said. Going forward, Shuttleworth said that Ubuntu users will still get access to an archive of .deb packages. That said, for users of a Snappy Ubuntu-based system, the apt-get command no longer applies. However, Shuttleworth explained that on a Snappy-based system there will be a container that contains all the deb packages. ‘The nice thing about Snappy is that it’s completely worry-free updates, ‘ Shuttleworth said.” Read more of this story at Slashdot.

More here:
Shuttleworth Says Snappy Won’t Replace .deb Linux Package Files In Ubuntu 15.10

Bugzilla Breached, Private Vulnerability Data Stolen

darthcamaro writes: Mozilla today publicly announced that secured areas of bugzilla, where non-public zero days are stored, were accessed by an attacker. The attacker got access to as many as 185 security bugs before they were made public. They say, “We believe they used that information to attack Firefox users.” The whole hack raises the issue of Mozilla’s own security, since it was a user password that was stolen and the bugzilla accounts weren’t using two-factor authentication. According to Mozilla’s FAQ about the breach (PDF), “The earliest confirmed instance of unauthorized access dates to September 2014. There are some indications that the attacker may have had access since September 2013.” Read more of this story at Slashdot.

View article:
Bugzilla Breached, Private Vulnerability Data Stolen

20+ Chinese Android Smartphones Models Come With Pre-Installed Malware

An anonymous reader writes: Security researchers from G DATA have published research (PDF) into Android phones produced in China, which found that a large number of devices ship with pre-installed malware and spyware. Affected models include the Xiaomi MI3, Huawei G510, Lenovo S860, Alps A24, Alps 809T, Alps H9001, Alps 2206, Alps PrimuxZeta, Alps N3, Alps ZP100, Alps 709, Alps GQ2002, Alps N9389, Android P8, ConCorde SmartPhone6500, DJC touchtalk, ITOUCH, NoName S806i, SESONN N9500, SESONN P8, Xido X1111, Star N9500, Star N8000 and IceFox Razor. The researchers do not believe the manufacturers are responsible for the malware; rather, they suspect middlemen within distribution channels. “According to G DATA, the contamination of these smartphones is done by hiding malware as add-on code in legitimate apps. Since users don’t usually interact with the malware and the add-on runs in the app’s background, unless using a mobile antivirus solution, these infections are rarely discovered.” Read more of this story at Slashdot.

View article:
20+ Chinese Android Smartphones Models Come With Pre-Installed Malware

Solar Windows Could Help Power Buildings

Lucas123 writes: Several companies are now beginning to roll out translucent photovoltaic films or solar cells embedded in windows that can supplement a significant amount of energy in the buildings where they’re used. SolarWindow Technologies, for example, is preparing to launch a transparent product made with organic PVs, while another company, Solaria, is cutting solar cells into thin strips and embedding them in windows. Both companies admit their products can’t produce the 20% efficiency ratings of today’s best rooftop solar panels, but they say that’s not their objective. Instead, the companies are looking to take advantage of millions of skyscraper windows that today are simply unused real estate for renewable energy. One company is aiming at supplementing 20% to 30% of a skyscrapers power requirements. Meanwhile, universities are also jumping into the solar window arena. Oxford University has spun off a PV window company that produces semi-transparent solar cells made of semi-transparent perovskite oxide that has achieved a 20% solar energy efficiency. Read more of this story at Slashdot.

See more here:
Solar Windows Could Help Power Buildings