AWS DevOps Blog: Speed Template Sharing with an AWS CloudFormation Designer URL
AWS CloudFormation Designer (Designer) is a graphic tool for creating, viewing, and modifying AWS CloudFormation templates. With Designer, you can construct templates by adding resources using a...
View ArticleKrebs on Security: Firm Sues Cyber Insurer Over $480K Loss
A Texas manufacturing firm is suing its cyber insurance provider for refusing to cover a $480,000 loss following an email scam that impersonated the firm's chief executive.
View ArticleSource Code in TV and Films: From Deutschland 83 Series 1, Episode 3. The...
From Deutschland 83 Series 1, Episode 3. The BASIC source code used to scroll a load of numbers on the screen which are purported to be encrypted West German nuclear documents....
View ArticleTorrentFreak: Vladimir Putin’s Internet Adviser Owns a Torrent Site
The man appointed last week as Vladimir Putin's key adviser on Internet related affairs recommended that copyright holders should stop being so demanding on piracy until the local economic situation...
View ArticleLWN.net: Wingo: Unboxing in Guile
Here is a long and detailed post from Andy Wingo on how he improved numerical performance in the Guile language by carefully removing runtime type information ("unboxing"). "If Guile did native...
View ArticleLWN.net: An unpleasant local kernel vulnerability
Perception Point discloses a use-after-free vulnerability in the kernel's keyring subsystem; it is exploitable for local privilege escalation. "If a process causes the kernel to leak 0x100000000...
View ArticleAWS Security Blog: How to Record and Govern Your IAM Resource Configurations...
AWS Config recently added the ability to record changes to the configuration of your AWS Identity and Access Management (IAM) users, groups, and roles (collectively referred to as IAM entities) and...
View ArticleTorrentFreak: All Major Oscar Contenders Leaked on Pirate Sites
Last week the 2016 Oscar nominees were announced, an event that inspired many people to check out the contenders. This increased interest is noticeable in legal channels and on various pirate sites,...
View ArticleLWN.net: Tuesday’s security updates
Debian has updated kernel (multiple vulnerabilities, including one from 2013). Debian-LTS has updated isc-dhcp (denial of service), passenger (environment variable injection), and srtp (denial of...
View ArticleAWS Official Blog: AWS Webinars for January, 2016
Did you resolve to learn something new in 2016? If so, you should attend an AWS webinar! Each month, we run a series of webinars that are designed to bring you up to speed on the latest AWS services...
View ArticleAWS Compute Blog: Powering your Amazon ECS Clusters with Spot Fleet
My colleague Drew Dennis sent a nice guest post that shows how to use Amazon ECS with Spot fleet. — There are advantages to using on-demand EC2 instances. However, for many workloads, such as stateless...
View ArticleRaspberry Pi: Malinux Télé: computers for children in Mali
Over the Christmas holidays we received an email from Julien Marin. He wanted to tell us about the Malinux Télé project, which he founded a year ago in Mali in West Africa, and to reach out for...
View ArticleLauren Weinstein's Blog: Understandable but Very Wrong: Google Enables...
Literally within hours of the horrifying and sickening news of a 15-year-old boy in Pakistan who cut off his own right hand after he was the target of hysterical false accusations of blasphemy, comes...
View ArticleAWS Security Blog: Introducing GxP Compliance on AWS
We're happy to announce that customers now are enabled to bring the next generation of medical, health, and wellness solutions to their GxP systems by using AWS for their processing and storage needs....
View ArticleLWN.net: [$] An interview with Joey Hess
Two of the earliest figures in the Linux community were Lars Wirzenius and Joey Hess. So when the former offered us an interview with the latter, we were quick to accept. Click below (subscribers...
View ArticleSchneier on Security: Reverse-Engineering a Zero-Day Exploit from the Hacking...
Last July, a still-anonymous hacker broke into the network belonging to the cyberweapons arms manufacturer Hacking Team, and dumped an enormous amount of its proprietary documents online. Kaspersky...
View ArticleAWS Official Blog: New – GxP Compliance Resource for AWS
Ever since we launched AWS, customers have been curious about how they can use it to build and run applications that must meet many different types of regulatory requirements. For example, potential...
View Articlexkcd.com: Palindrome
This post was syndicated from: xkcd.com and was written by: xkcd.com. Original post: at xkcd.com
View ArticleLWN.net: CyanogenMod shutting down WhisperPush
The CyanogenMod developers have announced that they will be shutting down the WhisperPush secure messaging system (covered here in 2013). "We’ve ultimately made the decision that we will no longer be...
View ArticleTorrentFreak: Pirate Site Trial in Norway Ends in Record Sentence
Despite Norway eliminating music piracy with quality legal offerings, last year several movies studios decided to renew their anti-piracy efforts by raiding the first video portal in years. The case...
View Article