LWN.net: Security advisories for Monday
Debian has updated openjdk-7 (unspecified vulnerability). Fedora has updated cyrus-imapd (F21: largely unspecified), gdm (F23: denial of service), jenkins (F23: multiple vulnerabilities),...
View ArticleSchneier on Security: Voter Surveillance
There hasn't been that much written about surveillance and big data being used to manipulate voters. In Data and Goliath, I wrote: Unique harms can arise from the use of surveillance data in politics....
View ArticleErrata Security: Some notes on the eDellRoot key
It was discovered this weekend that new Dell computers, as well as old ones with updates, come with a CA certificate ("eDellRoot") that includes the private key. This means hackers can eavesdrop on the...
View ArticleLWN.net: Red Hat Enterprise Linux 7.2
Red Hat has announced the release of Red Hat Enterprise Linux 7.2. "New features and capabilities focus on security, networking, and system administration, along with a continued emphasis on...
View ArticleAWS Official Blog: AWS Week in Review – November 16, 2015
Let’s take a quick look at what happened in AWS-land last week: Monday November 16 The announced that the AWS Security Token Service (STS) Is Now Active by Default in All AWS Regions. Eric Hammond...
View ArticleTorrentFreak: Hulu Accidentally Leaks Upcoming Fargo Episode
The upcoming episode of Fargo has leaked online after video streaming service Hulu made it public by accident. The error was swiftly fixed this weekend, but not before the new episode had spread across...
View ArticleAWS Official Blog: Now Available – EC2 Dedicated Hosts
Last month, I announced that we would soon be making EC2 Dedicated Hosts available. As I wrote at the time, this model allows you to control the mapping of EC2 instances to the underlying physical...
View ArticleLauren Weinstein's Blog: Hobby Drone Task Force Snookered by FAA
The report of the FAA-mandated "Drone Task Force" is out -- and it appears that the good folks who offered to help the FAA in its rush to regulate hobby drones have been pretty thoroughly snookered....
View ArticleКлошкодил: Monitoring-а на OpenFest 2015
Автор: Владимир Витков / zeridon Дата: 2015.11.16 Контакт: vvitkov@linux-bg.org / jabber: zeridon@jaim.at / irc: zeridon @ marla.ludost.net Тази година осъзнах, че OpenFest хич няма да е малко събитие....
View ArticleAWS Security Blog: s2n and Lucky 13
Great security research combines extremely high levels of creativity, paranoia, and attention to detail. All of these qualities are in evidence in two new research papers about how s2n, our Open...
View ArticleLinux How-Tos and Linux Tutorials: Best in Breed Twitter Clients for Linux
Twitter is a social networking service that is a bit of a conundrum to many. At any given time it can be used to connect with people of a like mind, and at another it’s an exercise in frustration,...
View ArticleKrebs on Security: Security Bug in Dell PCs Shipped Since 8/15
All new Dell laptops and desktops shipped since August 2015 contain a serious security vulnerability that exposes users to online eavesdropping and malware attacks. Dell says it is prepping a fix for...
View ArticleTorrentFreak: Kim Dotcom Slams U.S. “Bullies” as Extradition Hearing Ends
Kim Dotcom says he retains hope as his all-important extradition hearing wrapped up in New Zealand today. The fate of the Megaupload founder, who just slammed the U.S. as "bullies", now lies in the...
View ArticleLinux How-Tos and Linux Tutorials: The tar Command Explained
The Linux tar command is the swiss army of the Linux admin when it comes to archiving or distributing files. Gnu Tar archives can contain multiple files and directories, file permissions can be...
View ArticleTorrentFreak: Cox Has No DMCA Safe Harbor Protection, Judge Rules
Internet provider Cox Communications may be held liable for the copyright infringements of its subscribers, a Virginia District Court has ruled. According to the court, Cox failed to properly implement...
View ArticleSchneier on Security: Policy Repercussions of the Paris Terrorist Attacks
In 2013, in the early days of the Snowden leaks, Harvard Law School professor and former Assistant Attorney General Jack Goldsmith reflected on the increase in NSA surveillance post 9/11. He wrote: Two...
View ArticleRaspberry Pi: GPIO Zero: a friendly Python API for physical computing
Physical computing is one of the most engaging classroom activities, and it’s at the heart of most projects we see in the community. From flashing lights to IoT smart homes, the Pi’s GPIO pins make...
View ArticleAWS Security Blog: How to Use a Single IAM User to Easily Access All Your...
Many AWS customers keep their environments separated from each other: development resources do not interact with production, and vice versa. One way to achieve this separation is by using multiple AWS...
View ArticleLWN.net: Security updates for Tuesday
Debian-LTS has updated openjdk-6 (multiple vulnerabilities). Fedora has updated libsndfile (F22; F21: buffer overflow), mingw-freeimage (F23; F22: integer overflow), rpm (F23: denial of service),...
View Article