Toool's Blackbag: Abus EC60 impressioning
Last Friday, Jos got a little present: an ABUS E60 as an impressioning challenge. The keyway is way different to what he usually encounters during competitions (which would be the old trusted C83) so...
View ArticleSchneier on Security: FBI’s Cyber Most Wanted List
The FBI just added two members of the Syrian Electronic Army to its cyber most-wanted list. I had no idea that the FBI had a cyber most-wanted list.
View ArticleLWN.net: Security advisories for Wednesday
Debian has updated libmatroska (information leak) and pixman (code execution). Fedora has updated krb5 (F23: null pointer dereference), webkitgtk (F23: multiple vulnerabilities), and webkitgtk4 (F23:...
View ArticleRaspberry Pi: Astro Pi cases!
Last month we published a guide on how to 3D print your own Astro Pi flight case. Since then we’ve seen some amazing examples pop up over on Twitter. My favorites have to be the two below....
View ArticleTorrentFreak: Internet Archive Seeks to Defend Against Wrongful Copyright...
As a non-profit library of millions of free books, movies, software and music, the Internet Archive has a keen interest in copyright law. In a submission to the U.S. Copyright Office the Archive says...
View ArticleLWN.net: GNOME 3.20
GNOME 3.20 has been released. "This release brings significant improvements to many of our core applications, such as system upgrades and reviews in Software, simple photo editing in Photos and...
View ArticleAWS Blog: Amazon RDS for SQL Server – Support for Windows Authentication
Regular readers of this blog will know that I am a big fan of . As a managed database service, it takes care of the more routine aspects of setting up, running, and scaling a relational database. We...
View ArticleGrigor Gatchev - A Weblog: Гьотекатоидеологнатероризма…идругиневчесанимисли
През 1774 г. Йохан Волфганг фон Гьоте написва романът, който го прави известен – „Страданията на младия Вертер“. („Фауст“ идва много по-късно.) Ако случайно не сте го чели, романът разказва за млад...
View ArticleAWS Blog: Airbnb – Reinventing the Hospitality Industry on AWS
Airbnb is a classic story of how a few people with a great idea can disrupt an entire industry. Launched in 2008, over 80 million guests have stayed on Airbnb in over 2 million homes in over 190...
View ArticleLWN.net: [$] LWN.net Weekly Edition for March 24, 2016
The LWN.net Weekly Edition for March 24, 2016 is available.
View ArticleTorrentFreak: UK Police Arrest Pirate Box Seller, Threaten to Suspend Domain
The UK's Police Intellectual Property Crime Unit is continuing its crackdown against sellers of piracy-enabled TV devices. Their latest target is a 38-year-old man who was arrested in London on...
View ArticleSchneier on Security: Cryptography Is Harder Than It Looks
Writing a magazine column is always an exercise in time travel. I'm writing these words in early December. You're reading them in February. This means anything that's news as I write this will be old...
View ArticleKrebs on Security: Phishing Victims Muddle Tax Fraud Fight
Many U.S. citizens are bound to experience delays in getting their tax returns processed this year, thanks largely to more stringent controls enacted by Uncle Sam and the states to block fraudulent tax...
View ArticleTorrentFreak: BPI Hits 200 Million Google Takedowns, Calls for “Notice and...
In its ongoing efforts to have pirated content removed from the Internet, the BPI is about to hit a new milestone. This week the music industry group will report its 200 millionth URL to Google....
View ArticleRaspberry Pi: Raspberry Pi Oracle Weather Stations shipped
Big brown boxes If this blog was an Ealing comedy, it would be a speeded-up montage of an increasingly flustered postman delivering huge numbers of huge boxes to school reception desks across the land....
View ArticleLWN.net: CitusDB open-sourced
Citus Data has announced that its CitusDB distributed database has been released, under an open-source license (AGPLv3), as a PostgreSQL extension. "First, Citus 5.0 now fully uses the PostgreSQL...
View ArticleSchneier on Security: FBI vs. Apple: Who Is Helping the FBI?
On Monday, the FBI asked the court for a two-week delay in a scheduled hearing on the San Bernardino iPhone case, because some "third party" approached it with a way into the phone. It wanted time to...
View ArticleLWN.net: Thursday’s security updates
CentOS has updated foomatic (C6: three vulnerabilities, one from 2010), git (C7; C6: two code execution flaws), kernel (C6: two vulnerabilities), krb5 (C6: two vulnerabilities), and tomcat6 (C6:...
View ArticleKrebs on Security: Crooks Steal, Sell Verizon Enterprise Customer Data
Verizon Enterprise Solutions, a division of the telecommunications giant that gets called in to help organizations respond to some of the world's largest data breaches, is reeling from its own data...
View ArticleLWN.net: Hype Around the Mysterious ‘Badlock’ Bug Raises Criticism (WIRED)
The security circus continues to get sillier, it seems. WIRED is reporting on the "Badlock" bug that is being "reported" by SerNet—with the requisite catchy name, logo, and web site—but without any...
View Article