How an Aussie University Creates the World’s Best Hackers

bennyboy64 writes “An Australian university appears to be excelling at cultivating some of Australia’s best computer hackers. Following the University of NSW’s students recently placing first, second and third in a hacking war game (the first place winners also won first place last year), The Sydney Morning Herald reports on what exactly about the NSW institution is breeding some of Australia’s best hackers. It finds that a lecturer and mentor to the students with controversial views on responsible disclosure appears to the be the reason for their success.” Read more of this story at Slashdot.

Continued here:
How an Aussie University Creates the World’s Best Hackers

One day after iOS 6.1.3, a new iPhone lock screen bug emerges

Just a day after Apple released iOS 6.1.3 , a new lock screen bug has been discovered that could give an attacker access to private information. The vulnerability is different from the passcode bug(s) addressed by Tuesday’s iOS update, but the end result is similar: access to iPhone’s contact list and photos. The new lock screen bug was first documented by YouTube user videosdebarraquito , who posted a video demoing the procedure. The basic gist, seen in the video below, is to eject the iPhone’s SIM card while using the built-in voice controls to make a phone call. Bypassing the iPhone passcode lock on iOS 6.1.3. There are a couple important things to keep in mind, though. For one, it seems  like this bug applies to most modern iPhones, though apparently the procedure isn’t as easy as it looks. The YouTube video above shows the hack being executed on an iPhone 4, and iphoneincanada was able to replicate it on an iPhone 4. TheNextWeb was able to replicate it on an iPhone 4S but not an iPhone 5. But the iPhone 5 didn’t get away scot free, as German language site iPhoneblog.de appears to have been able to replicate the bug on that version of the phone. We have not yet seen a confirmed case of the bug existing on the iPhone 3GS, though it’s probably safe to assume that it does. Read 1 remaining paragraphs | Comments

Excerpt from:
One day after iOS 6.1.3, a new iPhone lock screen bug emerges

US Vulnerability Database Yanked Over Malware Infestation

hypnosec writes “The US government’s National Vulnerability Database (NVD) maintained by National Institute of Standards and Technology (NIST) has been offline for a few days because of malware infestation. The public-facing site has been taken offline because traces of malware were found on two of the web servers that house it. A post on Google+ containing an email from Gail Porter details the discovery of suspicious activity and subsequent steps taken by NIST. As of this writing the NVD website is still serving a page not found message.” Read more of this story at Slashdot.

Read the article:
US Vulnerability Database Yanked Over Malware Infestation

Widespread Compromise Of Yahoo-Backed Email In New Zealand

First time accepted submitter Bitsy Boffin writes “Xtra, the largest ISP in New Zealand, which outsources email provision to Yahoo, has in the last two days been subject to a widespread email compromise, causing potentially thousands of accounts to send spam messages to every address in their webmail address books. Discussion at Geekzone centers around this potentially being a continuation of the Yahoo XSS exploit. While Telecom NZ, the owners of Xtra internet service provider indicate that the problem was “resolved”, reports of spam from its members continue unabated. Telecom NZ are advising those affected to change their passwords.” Read more of this story at Slashdot.

Continue Reading:
Widespread Compromise Of Yahoo-Backed Email In New Zealand

Remote Linksys 0-Day Root Exploit Uncovered

Orome1 writes “DefenseCode researchers have uncovered a remote root access vulnerability in the default installation of Linksys routers. They contacted Cisco and shared a detailed vulnerability description along with the PoC exploit for the vulnerability. Cisco claimed that the vulnerability was already fixed in the latest firmware release, which turned out to be incorrect. The latest Linksys firmware (4.30.14) and all previous versions are still vulnerable.” Read more of this story at Slashdot.

Read More:
Remote Linksys 0-Day Root Exploit Uncovered

New Threadlike Carbon Nanotube Fiber Unveiled

Zothecula writes “At about 100 times the strength of steel and a sixth the weight, with impressive electrical conductive properties, carbon nanotubes (CNTs) have promised much since their discovery in 1991. The problem has been translating their impressive nanoscale properties into real-world applications on the macro scale. Researchers have now unveiled a new CNT fiber that conducts heat and electricity like a metal wire, is very strong like carbon fiber, and is flexible like a textile thread.” Read more of this story at Slashdot.

Visit link:
New Threadlike Carbon Nanotube Fiber Unveiled

YouTube Drops 2 Billion Fake Music Industry Views

An anonymous reader writes “YouTube has dropped 2 billion fake music industry views and their offending videos. From the article: ‘Google made good on its promise to weed out views inflated by artificial means last week, according to Daily Dot. Record company sites impacted included titans like Universal Music Group, which reportedly lost 1 billion of its 7 billion views, and Sony, who lost 850 million views. The cuts affected marquee names like Rhianna, Beyonce and Justin Bieber. YouTube said in a statement that the figures had been deliberately, artificially inflated. “This was not a bug or a security breach. This was an enforcement of our view count policy,” the company, which is owned by Google, wrote.'” Read more of this story at Slashdot.

Continue Reading:
YouTube Drops 2 Billion Fake Music Industry Views

Internet Explorer 8 and Earlier Vulnerable to New Exploit

If you prefer to use Internet Explorer or must use it in your enterprise environment you should be aware of a new exploit that takes advantage of the way IE accesses an object in memory that has been deleted or not properly allocated. More »

Read the article:
Internet Explorer 8 and Earlier Vulnerable to New Exploit

Microsoft Retiring Messenger, Replacing It With Skype

Entropy98 writes “Windows Live Messenger will be shut down by March 2013, after nearly 13 years of service, so Microsoft can focus its efforts on Skype, its recent $8.5bn acquisition. No word on whether users will be able to transfer their WLM accounts to Skype. ‘According to internet analysis firm Comscore, WLM still had more than double the number of Skype’s instant messenger facility at the start of this year and was second only in popularity to Yahoo Messenger. But the report suggested WLM’s US audience had fallen to 8.3 million unique users, representing a 48% drop year-on-year. By contrast, the number of people using Skype to instant message each other grew over the period.'” Read more of this story at Slashdot.

Read the article:
Microsoft Retiring Messenger, Replacing It With Skype