Schneier on Security: France Rejects Back Doors in Encryption Products
For the right reasons too: Axelle Lemaire, the Euro nation's digital affairs minister, shot down the amendment during the committee stage of the forthcoming omnibus digital bill, saying it would be...
View ArticleSchneier on Security: France Rejects Backdoors in Encryption Products
For the right reasons, too: Axelle Lemaire, the Euro nation's digital affairs minister, shot down the amendment during the committee stage of the forthcoming omnibus digital bill, saying it would be...
View ArticleRaspberry Pi: Young designer? Administrator? Come and work with us!
This week, we’re advertising a job at Pi Towers, and a job at Code Club in London. Here in Cambridge, we’re looking for a junior designer to join the communications team. The successful candidate will...
View ArticleTorrentFreak: Portugal’s Piracy Blocklist Censors U.S. Game Developer
The voluntary anti-piracy agreement between anti-piracy groups and ISPs in Portugal has resulted in some unusual collateral damage. In addition to hundreds of pirate sites, the blocklist now also...
View ArticleLWN.net: The State Of Meteor Part 1: What Went Wrong
Back in 2014, LWN looked at the Meteor web application framework. Now, Meteor's developers are contemplating why it failed to take over the world. "New developers love how easy it is to get started...
View ArticleBeyond Bandwidth: Threat Collaboration. It’s What We Do.
Collaboration, it’s what we do. And so should the industry. Here’s why: Cybercrime has infiltrated the lives of IT professionals, corporate employees, business owners and consumers in a way that goes...
View ArticleLWN.net: Linux Kernel ROP – Ropping your way to #
This article from Cysec Labs starts a series explaining how return-oriented programming (ROP) can be used to exploit vulnerabilities in the kernel. "ROP techniques take advantage of code misalignment...
View ArticleKrebs on Security: The Lowdown on Freezing Your Kid’s Credit
A story in a national news source earlier this month about freezing your child's credit file to preempt ID thieves prompted many readers to erroneously conclude that all states allow this as of 2016....
View ArticleGrigor Gatchev - A Weblog: Теориятазаразбитияпрозорец: НюЙорк…иние
През 1980-те Ню Йорк е врящ престъпен котел. На ден се извършват по около 1500 тежки престъпления, от които 6-7 са убийства. По улиците е опасно да се ходи нощем. В метрото да се пътува – дори денем....
View ArticleLauren Weinstein's Blog: The Politicians’ Encryption Backdoor Fantasies...
"I Got You Babe." I've written about law enforcement, politicians, and their hopeless fantasies of "safe" encryption backdoors so many times -- and have become so disgusted at the endlessly repeating...
View ArticleLWN.net: Security advisories for Wednesday
Arch Linux has updated kernel (privilege escalation). CentOS has updated kernel (C5: two remote denial of service vulnerabilities). Debian has updated bind9 (denial of service) and ecryptfs-utils...
View ArticleDarknet – The Darkside: 123456 Still The Most Common Password For 2015
So sadly, but also unsurprisingly ‘123456’ is still the most common password for 2015 (based on leaked password lists) the same as it was in years before, e.g. The 25 Worst Passwords Of 2013 –...
View ArticleLWN.net: [$] OpenSSH and the dangers of unused code
Unused code is untested code, which probably means that it harbors bugs—sometimes significant security bugs. That lesson has been reinforced by the recent OpenSSH "roaming" vulnerability. Leaving a...
View ArticleLWN.net: Dutch consumer group sues Samsung over Android updates (OSNews)
OSNews reports that the Dutch consumer protection advocacy agency Consumentenbond has sued Samsung, demanding updates for its Android phones. "The Consumentenbond had been in talks with Samsung about...
View ArticleTorrentFreak: Netflix Wants to Be a Great Carrot For ‘Real’ Pirates
Netflix CEO Reed Hastings has responded to the recent backlash over the company's VPN crackdown. Netflix doesn't expect the measures to have any impact revenue wise and says that it wants to be a...
View ArticleAWS Official Blog: 120 Uses for Your Empty Data Center
It is big. It is cold. It is secure. And now it is empty, because you have gone all-in to the AWS Cloud. So, what do you do with your data center? Once the pride and joy of your IT staff, it is now a...
View ArticleMatthew Garrett: Linux Foundation quietly drops community representation
The Linux Foundation is an industry organisation dedicated to promoting, protecting and standardising Linux and open source software[1]. The majority of its board is chosen by the member companies - 10...
View ArticleLWN.net: Garrett: Linux Foundation quietly drops community representation
On his blog, Matthew Garrett has noted that the Linux Foundation (LF) has dropped the community representatives to its board that were elected by the individual LF members. "The by-laws were amended...
View ArticleLWN.net: [$] LWN.net Weekly Edition for January 21, 2016
The LWN.net Weekly Edition for January 21, 2016 is available.
View ArticleKrebs on Security: Guy Who Tried to Frame Me In Heroin Plot Pleads Guilty to...
A Ukrainian man who tried to frame me for heroin possession has pleaded guilty to multiple cybercrime charges in U.S. federal court, including credit card theft and hacking into more than 13,000...
View Article