●Stories
●Firehose
●All
●Popular
●Polls
●Software
●Thought Leadership
Submit
●
Login
●or
●
Sign up
●Topics:
●Devices
●Build
●Entertainment
●Technology
●Open Source
●Science
●YRO
●Follow us:
●RSS
●Facebook
●LinkedIn
●Twitter
●
Youtube
●
Mastodon
●Bluesky
Follow Slashdot stories on Twitter
Forgot your password?
Close
wnewsdaystalestupid
sightfulinterestingmaybe
cflamebaittrollredundantoverrated
vefunnyunderrated
podupeerror
×
176698077
submission
Submitted
by
Beave
March 12, 2025 @05:42PM
Beave writes: The standard hardware security key in the tech space is typically a YubiKey. While I’m sure we all appreciate YubiKeys, there are many other key manufacturers out there. Each manufacturer and key has different capabilities, and are not all equal. This article will explore the various hardware security keys that can be used to store Passkeys and SSH keys. We will focus on usability, operating system compatibility, and costs. This article will likely help, whether you're looking for a personal key for projects or seeking to implement a passwordless solution at work.
170203527
submission
Submitted
by
Beave
January 25, 2023 @10:20PM
Beave writes: Security researchers and practitioners at Quadrant Information Security recently found themselves in a battle with the Russian ransomware gang known as “Black Basta” in an attempted “double extortion” scheme. Quadrant discovered the Russian gang attempting to exfiltrate data from a network. Data exfiltrated from a victims network is used as part one of the gangs “double extortion” scheme. Once a victim's data is fully exfiltrated, the gang then encrypts workstations and servers. This is part two of the “double extortion”. Once these tasks are completed, Black Basta demands ransom payments from the victim in order to decrypt their data and to prevent Black Basta from releasing exfiltrated data to the public.
Fortunately, in this case, Black Basta didn’t make it that far. Instead, the security researchers used the opportunity to better understand Black Basta’s "backend servers", tools, and methods.
It ends up Black Basta will sometimes use a victims network to log into their own servers, which leads to interesting opportunities to observe the gang's operations.
The first write up goes into technical details about the malware and tactics Black Basta used. The second second write up focuses on Black Basta’s “backend” servers and how they manage them.
TLDR? You can also listen to two of the security researchers discuss their findings on the latest episode of the "Breaking Badness" podcast.
124084408
comment
byBeave
20 @08:05PM
(#59666306)
Attached to: US Colleges Are Trying To Install Location Tracking Apps On Students' Phones
What if my phone battery dies. I don't get credit for being in class ?
124084376
comment
byBeave
20 @08:02PM
(#59666296)
Attached to: US Colleges Are Trying To Install Location Tracking Apps On Students' Phones
Funny. When Obama had a stock run, which is still more than Trump I might add, it was "the president can't and shouldn't take credit for that". Now it's the only thing Trump has.
Unemployment is at a all time low. That is great. However, wages have been stagnant to you need 3 jobs to make ends me. Care to own that as well?
123783968
comment
byBeave
2020 @07:13PM
(#59645914)
Attached to: Tesla Surges Past $100 Billion Market Value, Usurping VW
It's takes about the equivalent of 2 gallons of gas (think energy) to drive a Tesla about 300 miles. This is insanely more "clean" than fuel.
Also.. how exactly do you think fuel makes it to gas stations? Do you think gas is just pumped straight out of the ground? No, it has to be refined and shipped. These also factor into the energy costs. The "power from coal" is often cited by anti electric car people without taking into account these things.
13228410
story
Posted
by
timothy
ne 10, 2010 @02:38PM
from the pop-will-eat-itself dept.
kthreadd writes "The LLVM project is now working on a debugger called LLDB that's already faster than GDB and could be a possible alternative in the future for C, C++, and Objective-C developers. With the ongoing success of Clang and other LLVM subprojects, are the days of GNU as the mainstream free and open development toolchain passé?" LLVM stands for Low Level Virtual Machine; Wikipedia as usual has a good explanation of the parent project.
11649744
comment
byBeave
10 @12:39PM
(#31926746)
Attached to: Legal Spying Via the Cell Phone System
I'll be interested to read the details, but 2 out of the 3 things have been known for quite some time. The 'caller ID' spoofing trick has been known for _years_. The concept they are touting is known as "back spoofing". I've had friends doing this for a long time. However - there's one problem. No call cell phone associate caller ID with a phone. Yes, back spoofing works great - with _land lines_, but it's always that accurate with cell phones. So, "finding" the cell number that way isn't very reliable. If I have a boost mobile number, bought in cash, under a fake name you'll be out of luck. That is, the caller ID name (CNAM) won't be associated with it in the first place _and_ I gave all fake information to begin with.
About the voice mail. Not a big deal. This was reported 6 or more years ago. The idea is that you spoof your targets number with their cell number. The Telco side "sees" this as a call from the cell and drops you into their voicemail system. Some telco's have fixed this, other haven't. It's been a known flaw for years and years. You don't use CID for authentication exactly for this reason.
If possible, PIN protect your voicemail will stop these types of attacks (if possible). Anyways, the article is interesting, but several factors must fall into place or this attack won't work.
6516195
comment
byRonald Dumsfeld
ber 20, 2009 @12:54PM
(#29811413)
Attached to: Legal War For WA State Sunshine Law
I have to disagree here, and shake my head sadly at the number of up-modded clueless Slashbots talking on this.
It is people who wish to restrict gay rights behind this. It is a first in terms of arguing for anonymity in such a way on a petition-backed ballot option.
Gays who have campaigned elsewhere, and run petitions for ballot items, have put up with their names being publicly available.
If you're a raging homophobe in private, fine. If you want to sign a petition calling for a ballot on restricting the rights of people you don't like — have the balls to accept the potential consequences.
6515969
comment
byRonald Dumsfeld
ber 20, 2009 @12:42PM
(#29811245)
Attached to: Legal War For WA State Sunshine Law
Do you want to discuss the topic, or attack the person?
As seen on Usenet...
Ideas are beautiful and fragile things; attack people, not ideas.
6500439
comment
byRonald Dumsfeld
er 19, 2009 @04:59PM
(#29800819)
Attached to: Demo of EU's Planned "INDECT" Hints At Massive Data Mining, Little Privacy
Two possibilities:
Osama isn't in Pakistan (or Afghanistan) at all - he's disappeared, or died, or retired to Florida to drink pina-coladas all day, or -
The security forces don't actually WANT to find him, as once they do there's no reason for them to continue in the region: Job done, game over, go home. And then what will they do to keep the contracts flowing to their friends in low places?
Osama Bin Laden is, truly, the modern-day Emmanuel Goldstein.
6497287
story
Posted
by
timothy
ber 19, 2009 @02:33PM
from the greater-good-strikes-back dept.
Ronald Dumsfeld writes "Wikinews puts together some of the details around the EU's five-year-plan called Project INDECT, and brings attention to a leaked 'sales-pitch' video: 'An unreleased promotional video for INDECT located on YouTube is shown to the right. The simplified example of the system in operation shows a file of documents with a visible INDECT-titled cover stolen from an office and exchanged in a car park. How the police are alerted to the document theft is unclear in the video; as a "threat," it would be the INDECT system's job to predict it. Throughout the video use of CCTV equipment, facial recognition, number plate reading, and aerial surveillance give friend-or-foe information with an overlaid map to authorities. The police proactively use this information to coordinate locating, pursing, and capturing the document recipient. The file of documents is retrieved, and the recipient roughly detained.'"
6494831
submission
Submitted
by
Ronald Dumsfeld
Monday October 19, 2009 @12:44PM
Ronald Dumsfeld writes: Wikinews puts together some of the details around the EU's five-year-plan called Project INDECT, and brings attention to a leaked "sales-pitch" video.
"An unreleased promotional video for INDECT located on YouTube is shown to the right. The simplified example of the system in operation shows a file of documents with a visible INDECT-titled cover stolen from an office and exchanged in a car park. How the police are alerted to the document theft is unclear in the video; as a "threat", it would be the INDECT system's job to predict it.
Throughout the video use of CCTV equipment, facial recognition, number plate reading, and aerial surveillance give friend-or-foe information with an overlaid map to authorities. The police proactively use this information to coordinate locating, pursing, and capturing the document recipient. The file of documents is retrieved, and the recipient roughly detained."
6401389
comment
byRonald Dumsfeld
ber 13, 2009 @08:43PM
(#29740041)
Attached to: Vegetarian Spider Described
Remember, you are what you eat. But, what does that say about vegetarians?
6315261
comment
byRonald Dumsfeld
er 09, 2009 @05:53AM
(#29690509)
Attached to: Real-LIfe Distributed-Snooping Web Game To Launch In Britain
This is "Stasi 2.0".
Please, please. Keep detailed records of the interfering scumbags who sign up to work on this.
The chance of a revolution is small, but in that case I want to shoot these motherfuckers.
6311191
story
Posted
by
timothy
ber 09, 2009 @01:08AM
from the low-intensity-conflict dept.
Martin writes with this excerpt from Ars Technica: "Microsoft Office Starter 2010 will be not available for purchase; it will only come pre-loaded on new PCs. It includes basic functionality so users can view, edit, and create documents via Office Word Starter 2010 and Office Excel Starter 2010. Not only are these programs ad-supported, but Microsoft claims they are 'designed for casual Office users,' who apparently will be perfectly fine with reduced-functionality and ad-supported software."
« Newer
Older »
Slashdot Top Deals
●(email not shown publicly)
●
Got a Score:5 Comment
●
The Contradictor
●
Spent All My Mod Points
●
Re:The Law of Unintended Consequences
●
Re:Turn the tables
●
Re:Who the hell are they trying to catch?
(Score:2, Insightful)
●
Re:You don't make friends with salad
●
Re:So we can't afford Patrolling Police Officers..
●
Beave
●
indect (stories)
●
slashdot (submissions)
●
eu (submissions)
●
yro (submissions)
●
doorstop (stories)
●
EU might be listening to you at last
●
EU might be listening to you at last
●
Dear Lily- A letter to artists against filesharing
●
Wikipedia for Schools
●
Wikimedia leak: Will the Foundation "run on Su
Slashdot
●
Submit Story
It is much harder to find a job than to keep one.
●FAQ
●Story Archive
●Hall of Fame
●Advertising
●Terms
●Privacy Statement
●About
●Feedback
●Mobile View
●Blog
Do Not Sell or Share My Personal Information
Copyright © 2026 Slashdot Media. All Rights Reserved.
×
Close
Working...