Errata Security: My BIS/Wassenaar comment
This is my comment I submitted to the BIS on their Wassenaar rules:----Hi.I created the first “intrusion prevention system”, as well as many tools and much cybersecurity research over the last 20...
View ArticleTorrentFreak: Grooveshark Co-Founder Josh Greenberg Dies Aged 28
Grooveshark co-founder Josh Greenberg has been found dead at the home he shared with his girlfriend in Florida. He was 28. A medical examiner’s autopsy found no explanation for the cause of death and...
View ArticleLWN.net: Gorman: Continual testing of mainline kernels
Mel Gorman introduces SUSE's kernel performance-testing system. "Marvin is a system that continually runs performance-related tests and is named after another robot doomed with repetitive tasks. When...
View ArticleSANS Internet Storm Center, InfoCON: green: Searching Through the VirusTotal...
Now that my overview of Sysinternals tools with VirusTotal support is complete (Process Explorer, Autoruns and Sigcheck), lets address a couple of remarks I received (BTW, if I missed a Sysinternals...
View ArticleSchneier on Security: Malcom Gladwell on Competing Security Models
In this essay/review of a book on UK intelligence officer and Soviet spy Kim Philby, Malcom Gladwell makes this interesting observation: Here we have two very different security models. The Philby-era...
View ArticleRaspberry Pi: Bedbot – furniture with a tech twist
Fine woodwork has always been a mystery to me. I blame the church summer camp I went to when I was nine, where the boys got to build wooden doorknockers shaped like woodpeckers, and the girls – you...
View ArticleLWN.net: Security advisories for Tuesday
CentOS has updated bind (C7: denial of service) and thunderbird (C7; C6; C5: multiple vulnerabilities). Debian-LTS has updated cacti (SQL injection) and cacti (regression in previous update). Fedora...
View ArticleTorrentFreak: uTorrent Flagged As ‘Harmful’ by Anti-Virus Companies and Google
Several anti-virus vendors have begun blocking uTorrent after identifying the software as malicious or potentially dangerous. In addition, Google Chrome is currently blocking several pages on...
View ArticleKrebs on Security: Experian Hit With Class Action Over ID Theft Service
Big-three credit bureau Experian is the target of a class-action lawsuit just filed in California. The suit alleges that Experian negligently violated consumer protection laws when it failed to detect...
View ArticleLWN.net: New Cloud Native Computing Foundation to Drive Alignment Among...
The Linux Foundation has announced the Cloud Native Computing Foundation. "This new organization aims to advance the state-of-the-art for building cloud native applications and services, allowing...
View ArticleBackblaze Blog | The Life of a Cloud Backup Company: How to Make the Most of...
I’m sitting in a hotel room in a small remote town in the south of Germany, where I’m spending the week working. I did not come here because of a customer, partner, or work event. Instead my wife and I...
View ArticleLWN.net: [$] Domesticating applications, OpenBSD style
One of the many approaches to improving system security consists of reducing the attack surface of a given program by restricting the range of system calls available to it. If an application has no...
View ArticleSANS Internet Storm Center, InfoCON: green: Bartalex malspam pushing...
Introduction Earlier this year, we started seeing reports of macro-based Bartalex malware [1]. Bartalex has beenused in Microsoft Officedocuments sentthrough malicious spam (malspam). On Tuesday...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC StormCast for Wednesday, July...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleLWN.net: “Cloud Native Computing Foundation” launched
The Linux Foundation has announced the Cloud Native Computing Foundation. "This new organization aims to advance the state-of-the-art for building cloud native applications and services, allowing...
View Articlexkcd.com: Spice Girls
This post was syndicated from: xkcd.com and was written by: xkcd.com. Original post: at xkcd.com
View ArticleLWN.net: Stable kernels 4.1.3 and 4.0.9
The 4.1.3 and 4.0.9 stable kernel releases are available with the usual set of important fixes. Note that 4.0.9 is the last in the 4.0.x series.
View ArticleYABS: Дом
Домът е там где сърцето, бие със радост, не със тъга! Домът е там где детето, живее във теб дори и сега! Домът е там где небето, те гали със златна ръка Домът е там где морето струи от всяка … Continue...
View ArticleTorrentFreak: Most Aussie Pirates Are the Industry’s Best Customers
A survey commission by the Australian government has found that more than a quarter of all local Internet users consume content illegally online. Interestingly, while 7% of the population were found to...
View ArticleRaspberry Pi: Roberts R300 Reinvention
Liz: today’s guest post comes from Gordon at IQAudIO, who makes and sells audio accessories for the Pi, which we really, really like – with one of his DACs you can turn your Pi into a proper...
View Article