AWS Security Blog: How to Use AWS Config to Help with Required HIPAA Audit...
In my previous posts in this series, I explained how to get started with the DevSecOps environment for HIPAA that is depicted in the following architecture diagram. In my second post in this series, I...
View ArticleNerdling Sapple: ctmg: a Linux-native bash script Truecrypt replacement
ctmg - extremely simple encrypted container system ctmg is an encrypted container manager for Linux using cryptsetup and various standard file system utilities. Containers have the extension .ct and...
View ArticleLWN.net: Tuesday’s security advisories
Debian has updated libssh2 (insecure ssh sessions). Debian-LTS has updated didiwiki (unintended access), krb5 (two vulnerabilities), libssh (insecure ssh sessions), and libssh2 (insecure ssh...
View ArticleSchneier on Security: The Ads vs. Ad Blockers Arms Race
For the past month or so, Forbes has been blocking browsers with ad blockers. Today, I tried to access a Wired article and the site blocked me for the same reason. I see this as another battle in this...
View ArticleAWS Official Blog: Attending RSA in San Francisco? Visit the AWS Pop-up Loft...
Many of my colleagues will be heading to San Francisco next week for the RSA conference. In order to make your time in San Francisco even more worthwhile, you may want to consider attending some...
View ArticleLWN.net: Upcoming features in GCC 6
The Red Hat developer blog looks at what's coming in version 6 of the GNU Compiler Collection. "The x86/x86_64 is a segmented memory architecture, yet GCC has largely ignored this aspect of the Intel...
View ArticleTorrentFreak: Fancy an Anti-Piracy Threat….To Your Dropbox Email Address?
Dutch anti-piracy outfit BREIN is stepping up its game when it comes to scaring would-be pirates. While people sharing files in public using BitTorrent are the group's usual targets, BREIN has just...
View Articlexkcd.com: Diacritics
This post was syndicated from: xkcd.com and was written by: xkcd.com. Original post: at xkcd.com
View ArticleSource Code in TV and Films: From the Zkus na chvíli mi lhát music video by...
From the Zkus na chvíli mi lhát music video by Nebe, time 1:30. The astronaut learns to implement a queue.
View ArticleTorrentFreak: Popular Blu-Ray Ripper Shuts Down Following Legal Pressure
The Antigua-based software company SlySoft has shut down its website and ceased sales of the popular Blu-ray ripping software AnyDVD. The action comes several days after a group of Hollywood studios...
View ArticleSchneier on Security: Research on Balancing Privacy with Surveillance
Interesting research: Michael Kearns, Aaron Roth, Zhiewi Steven Wu, and Grigory Yaroslavtsev, "Private algorithms for the protected in social network search," PNAS, Jan 2016: Abstract: Motivated by...
View ArticleAWS Official Blog: AWS Marketplace Adds SharePoint Enterprise
makes it simple for you to discover, buy, and deploy many different types of software packages and applications including Network Infrastructure, Security, Web Apps, Business Intelligence, Big Data,...
View ArticleBeyond Bandwidth: Brick and Mortar Point-of-Sale Protections Force Fraudsters...
Retailers, if you think that with the recent implementation of point-of-sale credit card chip technology, you can finally turn your attention elsewhere, take note: while you’ve been focused on...
View ArticleRaspberry Pi: Connect 4 robot
So there was I, halfway through writing another blog post, when this landed on Twitter. Feast your eyes. It’s a Raspberry Pi robot that plays a pretty mean game of Connect 4. 4 Bot – Raspberry Pi...
View ArticleAWS Security Blog: How to Use AWS WAF to Block IP Addresses That Generate Bad...
Internet-facing web applications are frequently scanned and probed by various sources, sometimes for good and other times to identify weaknesses. It takes some sleuthing to determine the probable...
View ArticleToool's Blackbag: Toool Club Competition Winners
For over 10 years, we have held yearly club competitions at Toool. We collect some 25 locks and allow all Toool members to have a go at them. At a normal competition, you get a lock you have never...
View ArticleDarknet – The Darkside: 13 WordPress Security Tips From Acunetix
WordPress has a pretty poor reputation when it comes to security, so here are some WordPress security tips from Acunetix. The WordPress security perception is mostly unfounded sadly, as core WordPress...
View ArticleLWN.net: Security advisories for Wednesday
Arch Linux has updated libssh (insecure ssh sessions). Debian has updated libssh (multiple vulnerabilities), lighttpd (padding-oracle attack), and websvn (cross-site scripting). Debian-LTS has updated...
View ArticleKrebs on Security: Phishers Spoof CEO, Request W2 Forms
With tax filing season in the United States well underway, scammers who specialize in tax refund fraud have a new trick up their sleeves: Spoofing emails from a target organization's CEO, asking human...
View ArticleTorrentFreak: Japan Police Arrest 44 in Nationwide Internet Piracy Crackdown
Police in Japan have arrested 44 people suspected of being involved in illegal Internet file-sharing. Raids in over 90 locations across the country targeted individuals suspected of downloading and...
View Article