AWS Security Blog: How to Automate HIPAA Compliance (Part 1): Use the Cloud...
The United States healthcare ecosystem is highly complex. It is composed of review boards, regulating bodies, government agencies, pharmaceutical companies, insurance payers, and a mix of public and...
View ArticleLWN.net: Wielaard: Looking forward to GCC6 – Many new warnings
Mark Wielaard writes about some of the many new compiler warnings provided by the GCC6 release. "My favorite is still -Wmisleading-indentation. But there are many more that have found various bugs....
View ArticleLWN.net: Security updates for Monday
Arch Linux has updated firefox (same-origin restriction bypass) and nghttp2 (denial of service). Debian has updated iceweasel (denial of service), postgresql-9.1 (three vulnerabilities), and...
View ArticleTorrentFreak: Cox Refuses to Spy on Subscribers to Catch Pirates
Cox Communications is objecting to a broad permanent injunction requested by music publisher BMG. The music group wants the ISP to spy on its subscribers and take action against those who download...
View ArticleAWS Official Blog: AWS Week in Review – February 8, 2016
Let’s take a quick look at what happened in AWS-land last week: Monday February 8 We announced that Amazon Redshift Now Supports Appending Rows to Tables and Exporting Query Results to BZIP2-compressed...
View ArticleLWN.net: Secret Lab: It’s OK to abandon your project (Opensource.com)
Opensource.com covers a linux.conf.au talk by Paris Buttfield-Addison and Jon Manning of Secret Lab. "Secret Lab participates in hackathons to subtly subvert that mission by making interesting games...
View ArticleErrata Security: Fscking Visual Studio Code JS Hello World
The reason Linux never succeeded on the desktop is the lack of usability testing. Open-source programmers hate users, and created such an ugly baby that only a fanboy could love it. It's funny watching...
View ArticleSource Code in TV and Films: coding lesson in Serial Experiments Lain ep1
coding lesson in Serial Experiments Lain ep1
View ArticleTorrentFreak: Steal This Show S01E06: Revolutionizing Hollywood
Today we bring you the sixth episode of the Steal This Show podcast, with feature guest Lance Weiler. In this episode we discuss upsides of piracy and how digital distribution revolutionized indie...
View ArticleTorrentFreak: Kanye West’s The Life of Pablo Sparks Piracy Craze
Kanye West's latest album is making headlines in the news, and this buzz is directly translating to various pirate site. Over a half million people have downloaded a pirated copy of The Life of Pablo a...
View ArticleErrata Security: We’ve always been at war with Eastasia
Our media is surprisingly Orwellian, and it's not always due to government control. People practice "doublethink" at their own volition, without a Thought Police. Social media (Twitter, Facebook) are...
View ArticleSchneier on Security: Fear and Anxiety
More psychological research on our reaction to terrorism and mass violence: The researchers collected posts on Twitter made in response to the 2012 shooting attack at Sandy Hook Elementary School in...
View ArticleRaspberry Pi: A Raspberry Pi-controlled book scanner
Today we’ve an excellent project from our forums to share with you: Jonathon Duerig, known as duerig on the forums, posts about the standalone book scanner he has built, controlled by a Raspberry Pi 2...
View ArticleTorrentFreak: Singapore Court Orders Country’s First Pirate Site Blockade
Solarmovie.ph will become the first piracy website to be blocked on copyright grounds by Internet service providers in Singapore. Legislation targeting pirate sites was introduced in 2014 but progress...
View ArticleKrebs on Security: The Great EMV Fake-Out: No Chip For You!
Many banks are now issuing customers more secure chip-based credit cards, and most retailers now have card terminals in their checkout lanes that can handle the "dip" of chip-card transactions (as...
View ArticleDarknet – The Darkside: LNHG – Massive Web Fingerprinter (mwebfp)
The LowNoiseHG (LNHG) Massive Web Fingerprinter was conceived in July 2013 after realizing the usefulness of webserver screenshots to pentesters, during an engagement with large external or internal IP...
View ArticleLWN.net: A remote code execution vulnerability in glibc
The Google Online Security Blog discloses a security issue in the GNU C library; a fix, workarounds, and a proof-of-concept exploit are all provided. "The glibc DNS client side resolver is vulnerable...
View ArticleBackblaze Blog | The Life of a Cloud Backup Company: Hard Drive Reliability...
By the end of 2015, the Backblaze datacenter had 56,224 spinning hard drives containing customer data. These hard drives reside in 1,249 Backblaze Storage Pods. By comparison 2015 began with 39,690...
View ArticleAWS Official Blog: AWS Webinars for February & Early March 2016
Last month I challenged you to learn something new in 2016 and offered up our January webinar series as a starting point. We’ve put together another strong lineup for February and I’d like to share it...
View ArticleLWN.net: Security advisories for Tuesday
Debian has updated eglibc (multiple vulnerabilities), glibc (multiple vulnerabilities), graphite2 (three vulnerabilities), and libgcrypt11 (key leak). Debian-LTS has updated xdelta3 (code execution)....
View Article