Krebs on Security: Thieves Phish Moneytree Employee Tax Data
Payday lending firm Moneytree is the latest company to alert current and former employees that their tax data -- including Social Security numbers, salary and address information -- was accidentally...
View ArticleRaspberry Pi: Success for Code Clubs in South Wales libraries
It’s four o’clock on a Tuesday afternoon, and, in an old Victorian library in a small town in South Wales, big things are happening. The computer room is crammed with children, all intently focused and...
View ArticleTorrentFreak: “Open WiFi Operators Are Not Liable for Pirating Users”
Restaurants, bars and shops that offer their customers free and open Wi-Fi are not liable for pirating users. This is the advice Advocate General Szpunar has sent to the EU Court of Justice in what may...
View ArticleLWN.net: Security advisories for Wednesday
CentOS has updated samba (C7; C6: arbitrary file access) and samba4 (C6: arbitrary file access). Debian has updated spip (two vulnerabilities). Fedora has updated bind99 (F23: multiple...
View ArticleLWN.net: [$] Thread-level control with resource groups
The kernel's control-group mechanism allows processes to be divided into groups for the purposes of tracking and resource control. Both the API and underlying implementation of this mechanism have...
View ArticleLWN.net: [$] The Car Hacker’s Handbook
No Starch Press recently released a book about working with automotive software systems: The Car Hacker's Handbook: A Guide for the Penetration Tester, written by Craig Smith. The book is an expansion...
View ArticleAWS Security Blog: Free qwikLABS Online Labs Through the End of March
To celebrate 10 years of AWS, qwikLABS is offering 95 free online labs through the end of March 2016. Here are some of the labs related to security and compliance that you can take for free while the...
View ArticleAWS Official Blog: Additional Failover Control for Amazon Aurora
is a fully-managed, MySQL-compatible, relational database engine that combines the speed and availability of high-end commercial databases with the simplicity and cost-effectiveness of open source...
View ArticleLWN.net: Stable kernel updates
Greg Kroah Hartman has released stable kernels 4.4.6, 3.14.65, and 3.10.101. Each contains the usual set of important fixes.
View ArticleLWN.net: [$] LWN.net Weekly Edition for March 17, 2016
The LWN.net Weekly Edition for March 17, 2016 is available.
View ArticleAWS Official Blog: S3 Lifecycle Management Update – Support for Multipart...
It is still a bit of a shock to me to realize that Amazon S3 is now ten years old! The intervening decade has simply flown by. For several years, you have been able to use S3’s Lifecycle Management...
View ArticleSource Code in TV and Films: From Spectre. Q hacks into the new MI6 system....
From Spectre. Q hacks into the new MI6 system. There is a small window with quickly scrolling Java code on the right. Unfortunately the code is out of camera focus and almost unreadable. Only few words...
View ArticleDarknet – The Darkside: Defence In Depth For Web Applications
Defence in depth for web applications is something that not many companies apply even though the model itself is nothing new. Defence in depth refers to applying security controls across multiple...
View ArticleМедийно право : Съд на ЕС: ЕК/България: защитени зони
В Официален вестник на ЕС Решение на Съда (трети състав) от 14 януари 2016 г. — Европейска комисия/Република България (Дело C-141/14) ((Неизпълнение на задължения от държава членка – Директива...
View ArticleМедийно право : Съд на ЕС: отговорност за извършени от потребител нарушения...
Стана известно Заключението на Генералния адвокат Szpunar по дело C-484/14 Tobias Mc Fadden/Sony Music Entertainment Germany GmbH. Лице, което стопанисва магазин, бар или хотел и предоставя...
View ArticleTorrentFreak: Apple App Piracy Technique Used For Malware
A technique used for installing pirated iOS apps onto non-jailbroken Apple devices has now been deployed by criminals looking to compromise user accounts. A piece of malware known as 'AceDeceiver'...
View ArticleRaspberry Pi: LEGO NesPi case
Some weeks ago, a mysterious package arrived at New Pi Towers, from Spain. It made its way to my desk. I opened it. It began to attract a lot of visitors. RaspiPC.es is a Raspberry Pi and accessories...
View ArticleКлошкодил: Втори BGP workshop
Ще правим втори BGP workshop, пишете ми да ви запиша (вече има 11 човека в списъка). (трябва да ви има тук, за да ви броим за записани)
View ArticleSchneier on Security: New NIST Encryption Guidelines
NIST has published a draft of their new standard for encryption use: "NIST Special Publication 800-175B, Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic...
View ArticleLWN.net: Security updates for Thursday
CentOS has updated bind (C5; C6; C7: two vulnerabilities), bind97 (C5: two vulnerabilities), kernel (C5: two vulnerabilities, one from 2013), and thunderbird (C5; C6; C7: multiple vulnerabilities)....
View Article