Quantcast
Channel: Noise
Browsing all 39395 articles
Browse latest View live

Schneier on Security: NSA and GCHQ Hacked Israeli Drone Feeds

The NSA and GCHQ have successfully hacked Israel's drones, according to the Snowden documents. The story is being reported by the Intercept and Der Spiegel. The Times of Israel has more.

View Article


Image may be NSFW.
Clik here to view.

LWN.net: [$] Whole-house audio with free hardware and software

The Black Forest fire destroyed over 500 Colorado houses in June 2013; one of those belonged to longtime Debian developer Bdale Garbee. As he reported during his talk at the 2016 linux.conf.au...

View Article


Image may be NSFW.
Clik here to view.

AWS DevOps Blog: Continue Rolling Back an Update for AWS CloudFormation...

AWS CloudFormation allows developers and systems administrators to create and manage a collection of related AWS resources (called a stack) by provisioning and updating them in an orderly and...

View Article

Linux How-Tos and Linux Tutorials: Getting started with Let’s Encrypt SSL...

This tutorial will guide you through your very first configuration of an SSL website with Lets Encrypt certification. Let's Encrypt is a new SSL authority that provides free SSL certificates.Read more...

View Article

Errata Security: Some notes on the Norse collapse

Recently, cybersec company "Norse Security" imploded. Their leaders and most the employees were fired, and their website is no longer available. I thought I'd write up some notes on this.All VC-funded...

View Article


Source Code in TV and Films: From South Park – Sponsored content

From South Park - Sponsored content

View Article

Image may be NSFW.
Clik here to view.

Darknet – The Darkside: WAF-FLE – Graphical ModSecurity Console Dashboard

WAF-FLE (Web Application Firewall: Fast Log and Event Console) is a OpenSource ModSecurity Console – which allows the modsecurity admin to store, view and search events sent by sensors. It uses a...

View Article

TorrentFreak: Torrent Tracker Knocked Offline by ‘Faulty’ Takedown Requests

An Indian film production company is overloading hosting companies with takedown notices, asking the providers to take down some of the largest torrent trackers in the world. While the notices are not...

View Article


Raspberry Pi: Do more with your #PiZero in The MagPi 42

Hi there, Rob from The MagPi again! It’s been a couple of months since we launched issue 40 with the Raspberry Pi Zero attached to the front of it. Since then we’ve seen some excellent projects flying...

View Article


Schneier on Security: More Details on the NSA Switching to Quantum-Resistant...

The NSA is publicly moving away from cryptographic algorithms vulnerable to cryptanalysis using a quantum computer. It just published a FAQ about the process: Q: Is there a quantum resistant public-key...

View Article

Image may be NSFW.
Clik here to view.

AWS Security Blog: How to Set Up DNS Resolution Between On-Premises Networks...

In my previous post, I showed how to use Simple AD to forward DNS requests originating from on-premises networks to an Amazon Route 53 private hosted zone. Today, I will show how you can use Microsoft...

View Article

Krebs on Security: Good Riddance to Oracle’s Java Plugin

Good news: Oracle says the next major version of its Java software will no longer plug directly into the user's Web browser. This long overdue step should cut down dramatically on the number of...

View Article

LWN.net: Tuesday’s security advisories

Arch Linux has updated curl (authentication bypass), lib32-curl (authentication bypass), python-django (permission bypass), and python2-django: permission bypass). Fedora has updated bind (F22: two...

View Article


TorrentFreak: Torrents-Time Brings Popcorn Time to Any Windows Browser

Software making its debut this week is helping to breathe new life into the Popcorn Time concept. Torrents-Time is a plug-in that in conjunction with a new breed of websites will enable users to run...

View Article

Errata Security: Is packet-sniffing illegal? (OmniCISA update)

In the news recently, Janet Napolitano (formerly head of DHS, now head of California's university system) had packet-sniffing software installed at the UC Berkeley campus to monitor all its traffic....

View Article


Schneier on Security: Paper on the Going Dark Debate

I am pleased to have been a part of this report, part of the Berkman Center's Berklett Cybersecurity project: Don't Panic: Making Progress on the "Going Dark" Debate From the report: In this report, we...

View Article

Errata Security: They are deadly serious about crypto backdoors

Julian Sanchez (@normative) has an article questioning whether the FBI is serious about pushing crypto backdoors, or whether this is all a ploy pressuring companies like Apple to give them access. I...

View Article


LWN.net: Catanzaro: On WebKit security updates

Michael Catanzaro describes the sad state of WebKit security on Linux distributions and the challenges of security support for such a complex package in general. "We regularly receive bug reports from...

View Article

xkcd.com: Backslashes

This post was syndicated from: xkcd.com and was written by: xkcd.com. Original post: at xkcd.com

View Article

Grigor Gatchev - A Weblog: Клаксонътиусмивката

Пътят се вие сред хълмовете пред Средна гора. В добро състояние, почти без дупки. Двигателят мърка спокойно. Връщам се от приятна почивка – сборище на фенове, по-чудесно и стимулиращо прекарване на...

View Article
Browsing all 39395 articles
Browse latest View live