LWN.net: Stable kernel updates
Greg Kroah-Hartman has released stable kernels 4.1.4, 3.14.49, and 3.10.85. All of them contain important fixes.
View ArticleTorrentFreak: Popcorn Time Vulnerable to Hack Attacks, Researcher Says
A fork of the popular Popcorn Time application is vulnerable to hacking attacks, a researcher says. Antonios Chariton, aka DaKnOb, says that a man-in-the-middle attacker can gain complete control of a...
View ArticleBackblaze Blog | The Life of a Cloud Backup Company: Two-Factor Verification...
Backblaze users can now activate and use two-factor verification on their Backblaze Online Backup account. When enabled, two-factor verification, known widely as two-factor authentication, requires...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC StormCast for Tuesday, August...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleTorrentFreak: Pirate Site Blocking Delay Shows Lack of Urgency, Critics Say
Copyright holders who demanded a rapid introduction of site-blocking legislation in Australia are coming under fire for not presenting their first cases quickly enough. Under intense pressure the...
View Articleyovko.net: Две обществени пекарни
Днес искам да споделя още две истории за силата на обикновените хора и малкия локален бизнес, които много си приличат, но илюстрират различни модели на финансиране за социално предприемачество. Иде реч...
View ArticleKrebs on Security: Chinese VPN Service as Attack Platform?
Hardly a week goes by without a news story about state-sponsored Chinese cyberspies breaking into Fortune 500 companies to steal intellectual property, personal data and other invaluable assets. Now,...
View ArticleSANS Internet Storm Center, InfoCON: green: Whatever Happened to...
Last year, we wrote about the Moon Worm, a bitcoin mining piece of malware that infected Linksys routers. Ever since then, I have seen lots and lots of hits to the vulnerable cgi script...
View ArticleRaspberry Pi: Autonomous recording for marine ecology
Cetacean species, including whales, dolphins and porpoises, are considered indicators of the health of marine ecosystems around the world. While a number are known to be endangered, a lack of data...
View ArticleTorrentFreak: German Court Will Issue Pirate Site Blocking Decision in November
Germany's Supreme Court says it will hand down a decision on the country's first 'pirate' website blocking case in November. The case was initiated by infamous rightsholder group GEMA who are suing...
View ArticleSchneier on Security: Shooting Down Drones
A Kentucky man shot down a drone that was hovering in his backyard: "It was just right there," he told Ars. "It was hovering, I would never have shot it if it was flying. When he came down with a video...
View ArticleLWN.net: Announcing the shutdown of the Ada Initiative
The Ada Initiative has announced that it is shutting down in mid-October. In the four years since it was founded, the organization has accomplished a lot to help create a less hostile environment for...
View ArticleLinux How-Tos and Linux Tutorials: How To Make Your Linux Server More Secure
I run a couple of Linux servers; one at home as a file server and three live servers for my site, my mail, and my cloud storage, respectively. Although I don't worry about the home server because it...
View ArticleLWN.net: Tuesday’s security advisories
Debian has updated squid3 (security bypass) and wordpress (multiple vulnerabilities). Fedora has updated quassel (F21: denial of service). Mageia has updated ipython (MG4,5: two vulnerabilities),...
View ArticleTorrentFreak: Copyright Troll Asks Court to Ban the Term ‘Copyright Troll’
Adult movie studio Malibu Media has asked the Indiana federal court to ban negative terms during an upcoming trial against an alleged BitTorrent pirate. According to the copyright troll, descriptions...
View ArticleLWN.net: Coalition Announces New ‘Do Not Track’ Standard for Web Browsing
The Electronic Frontier Foundation (EFF), privacy company Disconnect and a coalition of Internet companies have announced a stronger “Do Not Track” (DNT) setting for Web browsing—"a new policy standard...
View ArticleDarknet - The Darkside: FruityWifi – Wireless Network Auditing Tool
FruityWifi is an open source wireless network auditing tool, it allows the user to deploy advanced attacks by directly using the web interface or by sending messages to it. Initially the application...
View ArticleMatthew Garrett: Reverse this
The TODO group is an industry body that appears to be trying to define community best practices or something. I don't really know what their backstory is and whether they're trying to do meaningful...
View ArticleTorrentFreak: RIAA Asks BitTorrent Inc. to Block Infringing Content
The RIAA has asked uTorrent creator BitTorrent Inc. to come up with ways to stop infringement of its members' copyrighted content. In a letter sent to BitTorrent Inc's CEO, the RIAA's Executive Vice...
View ArticleSANS Internet Storm Center, InfoCON: green: Nuclear EK traffic patterns in...
Introduction About two weeks ago, Nuclear exploit kit (EK)changed its URL patterns. Now it looks a bit likeAngler EK. Kafeine originally announced the change on 2015-07-21 [1], and we collected...
View Article