An anonymous reader writes: “An anonymous security researcher has published details on a vulnerability named “Antbleed,” which the author claims is a remote backdoor affecting Bitcoin mining equipment sold by Bitmain, the largest vendor of crypto-currency mining hardware on the…
Ask Slashdot: What Are Your Favorite Books On Entrepreneurship?
An anonymous reader writes: There are excellent well-known books like Steve Jobs by Walter Isaacson and Shoe Dog by Phil Knight, but I find some of the lesser-known books about tech entrepreneurship very interesting, like A Triumph of Genius about…
University of California IT Workers Replaced By Offshore Outsourcing Firm To File Discrimination Lawsuit
The IT workers from the University of California’s San Francisco campus who were replaced by an offshore outsourcing firm late last year intend to file a lawsuit challenging their dismissal. “It will allege that the tech workers at the university’s…
AT&T To Roll Out 5G Network That's Not Actually 5G
AT&T announced plans to deliver what it’s calling the “5G Evolution” network to more than 20 markets by the end of the year. While the company is “using some wordsmithing to deliver to you faster internet speeds,” it’s important to…
DNA-Based Test Can Spot Cancer Recurrence a Year Before Conventional Scans
An anonymous reader quotes a report from The Guardian: A revolutionary blood test has been shown to diagnose the recurrence of cancer up to a year in advance of conventional scans in a major lung cancer trial. The test, known…
Attack Method Highlights Weaknesses in Microsoft CFG
As Microsoft hardens its defenses with tools such as Control Flow Guard, researchers at Endgame are preparing for the reality of Counterfeit Object-Oriented Programming attacks to move from theoretical to real.
The Time Has Arrived to Embrace Hackers
Source Boston keynoter Keren Elazari sounded a call to action for industry to extend an acceptance of hackers.
Chrome to Mark More HTTP Pages ‘Not Secure’
Starting with Chrome 62, Google will start marking any HTTP page where users may enter data, and any HTTP page visited in incognito mode
Lack of Communication Achilles’ Heel for Ransomware Fighters
A member of law enforcement acknowledged at SOURCE Boston that the lack of communication around ransomware remains a serious problem.
Ransomware, Cyberespionage Dominate Verizon DBIR
Verizon’s Data Breach Investigations Report for 2017 shows big growth in the reported number of ransomware attacks and incidents involving cyberespionage.