Schneier on Security: NSA and GCHQ Hacked Israeli Drone Feeds
The NSA and GCHQ have successfully hacked Israel's drones, according to the Snowden documents. The story is being reported by the Intercept and Der Spiegel. The Times of Israel has more.
View ArticleLWN.net: [$] Whole-house audio with free hardware and software
The Black Forest fire destroyed over 500 Colorado houses in June 2013; one of those belonged to longtime Debian developer Bdale Garbee. As he reported during his talk at the 2016 linux.conf.au...
View ArticleAWS DevOps Blog: Continue Rolling Back an Update for AWS CloudFormation...
AWS CloudFormation allows developers and systems administrators to create and manage a collection of related AWS resources (called a stack) by provisioning and updating them in an orderly and...
View ArticleLinux How-Tos and Linux Tutorials: Getting started with Let’s Encrypt SSL...
This tutorial will guide you through your very first configuration of an SSL website with Lets Encrypt certification. Let's Encrypt is a new SSL authority that provides free SSL certificates.Read more...
View ArticleErrata Security: Some notes on the Norse collapse
Recently, cybersec company "Norse Security" imploded. Their leaders and most the employees were fired, and their website is no longer available. I thought I'd write up some notes on this.All VC-funded...
View ArticleSource Code in TV and Films: From South Park – Sponsored content
From South Park - Sponsored content
View ArticleDarknet – The Darkside: WAF-FLE – Graphical ModSecurity Console Dashboard
WAF-FLE (Web Application Firewall: Fast Log and Event Console) is a OpenSource ModSecurity Console – which allows the modsecurity admin to store, view and search events sent by sensors. It uses a...
View ArticleTorrentFreak: Torrent Tracker Knocked Offline by ‘Faulty’ Takedown Requests
An Indian film production company is overloading hosting companies with takedown notices, asking the providers to take down some of the largest torrent trackers in the world. While the notices are not...
View ArticleRaspberry Pi: Do more with your #PiZero in The MagPi 42
Hi there, Rob from The MagPi again! It’s been a couple of months since we launched issue 40 with the Raspberry Pi Zero attached to the front of it. Since then we’ve seen some excellent projects flying...
View ArticleSchneier on Security: More Details on the NSA Switching to Quantum-Resistant...
The NSA is publicly moving away from cryptographic algorithms vulnerable to cryptanalysis using a quantum computer. It just published a FAQ about the process: Q: Is there a quantum resistant public-key...
View ArticleAWS Security Blog: How to Set Up DNS Resolution Between On-Premises Networks...
In my previous post, I showed how to use Simple AD to forward DNS requests originating from on-premises networks to an Amazon Route 53 private hosted zone. Today, I will show how you can use Microsoft...
View ArticleKrebs on Security: Good Riddance to Oracle’s Java Plugin
Good news: Oracle says the next major version of its Java software will no longer plug directly into the user's Web browser. This long overdue step should cut down dramatically on the number of...
View ArticleLWN.net: Tuesday’s security advisories
Arch Linux has updated curl (authentication bypass), lib32-curl (authentication bypass), python-django (permission bypass), and python2-django: permission bypass). Fedora has updated bind (F22: two...
View ArticleTorrentFreak: Torrents-Time Brings Popcorn Time to Any Windows Browser
Software making its debut this week is helping to breathe new life into the Popcorn Time concept. Torrents-Time is a plug-in that in conjunction with a new breed of websites will enable users to run...
View ArticleErrata Security: Is packet-sniffing illegal? (OmniCISA update)
In the news recently, Janet Napolitano (formerly head of DHS, now head of California's university system) had packet-sniffing software installed at the UC Berkeley campus to monitor all its traffic....
View ArticleSchneier on Security: Paper on the Going Dark Debate
I am pleased to have been a part of this report, part of the Berkman Center's Berklett Cybersecurity project: Don't Panic: Making Progress on the "Going Dark" Debate From the report: In this report, we...
View ArticleErrata Security: They are deadly serious about crypto backdoors
Julian Sanchez (@normative) has an article questioning whether the FBI is serious about pushing crypto backdoors, or whether this is all a ploy pressuring companies like Apple to give them access. I...
View ArticleLWN.net: Catanzaro: On WebKit security updates
Michael Catanzaro describes the sad state of WebKit security on Linux distributions and the challenges of security support for such a complex package in general. "We regularly receive bug reports from...
View Articlexkcd.com: Backslashes
This post was syndicated from: xkcd.com and was written by: xkcd.com. Original post: at xkcd.com
View ArticleGrigor Gatchev - A Weblog: Клаксонътиусмивката
Пътят се вие сред хълмовете пред Средна гора. В добро състояние, почти без дупки. Двигателят мърка спокойно. Връщам се от приятна почивка – сборище на фенове, по-чудесно и стимулиращо прекарване на...
View Article