SANS Internet Storm Center, InfoCON: green: Adobe Updates Acrobat and Adobe...
Adobe has released APSB15-24 which addresses 56 vulnerabilities: CVE-2015-5583, CVE-2015-5586, CVE-2015-6683, CVE-2015-6684, CVE-2015-6685, CVE-2015-6686, CVE-2015-6687, CVE-2015-6688, CVE-2015-6689,...
View ArticleLauren Weinstein's Blog: Social Media Abuse Stories to Shrivel Your Soul
Recently in "Research Request: Seeking Facebook or Other 'Real Name' Identity Policy Abuse Stories" -- http://lauren.vortex.com/archive/001131.html -- I requested that readers send me examples of...
View ArticleLWN.net: [$] Fedora opens up to bundling
The term "bundling" refers to the practice of distributing a copy of one software project (usually some sort of library) within another one. Software developers may have a number of reasons for...
View ArticleTorrentFreak: RIAA Sues ‘Popcorn Time for Music’
The RIAA has wasted no time in filing a lawsuit against recently launched music application Aurous. Just days after its alpha launch, Florida based developer Andrew Sampson and his company are being...
View ArticleKrebs on Security: Hacker Who Sent Me Heroin Faces Charges in U.S.
A Ukrainian hacker who once hatched a plot to have heroin sent to my Virginia home and then alert police when the drugs arrived had his first appearance in a U.S. court today, after being extradited to...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC StormCast for Wednesday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleSANS Internet Storm Center, InfoCON: green: AV Phone Scan via Fake BSOD Web...
A few days ago, I found a malicious website which triesto lure the visitor by simulating a Microsoft Windows Blue Screen of Death(BSOD) and popping up error messages within their browser. This is not a...
View ArticleSANS Internet Storm Center, InfoCON: green: Would you like use to encrypt...
--- Johannes B. Ullrich, Ph.D. STI|Twitter|LinkedIn (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleLWN.net: [$] WiFi routers: from lockdown to lock-open
There has been a lot of concern recently that a new set of rules [PDF] from the US Federal Communications Commission (FCC) could lead to locking-down of home router devices. It appears that the...
View ArticleRaspberry Pi: Major League Hacking Local Hack Day
18,000 stickers, 2,000 selfie-sticks and 8,000 slices of pizza hurtled across the planet last week to 14 different countries. It was a day that almost 4000 students had been eagerly awaiting. Major...
View ArticleSchneier on Security: Obama Administration Not Pursuing a Backdoor to...
The Obama Administration is not pursuing a law that would force computer and communications manufacturers to add backdoors to their products for law enforcement. Sensibly, they concluded that...
View ArticleTorrentFreak: 2,800 Cloudflare IP Addresses Blocked By Court Order
When SOPA was imminent, Internet users expressed concerns that web blocking might "break the Internet". The legislation didn't pass, but according to data just published by a web-blocking watchdog in...
View ArticleKrebs on Security: Adobe, Microsoft Push Critical Security Fixes
Adobe and Microsoft on Tuesday each released security updates to remedy critical vulnerabilities in their software. Adobe pushed patches to plug at least 56 security holes present in Adobe Reader and...
View ArticleBackblaze Blog | The Life of a Cloud Backup Company: What Can 49,056 Hard...
As of the end of Q3 2015, there were 50,228 drives spinning in the Backblaze datacenter. Subtracting boot drives, drive models with less than 45 drives and drives in testing systems, we are publishing...
View ArticleLWN.net: Security advisories for Wednesday
Arch Linux has updated chromium (multiple vulnerabilities) and flashplugin (multiple vulnerabilities). Fedora has updated icu (F22: multiple vulnerabilities), php (F22: multiple vulnerabilities), and...
View ArticleDarknet - The Darkside: More Drama About Hillary Clinton’s E-mail Leak – VNC...
So this Hillary Clinton’s e-mail leak case has been a pretty interesting phenomena to observe and has been going on since last month, we didn’t really cover it as well it mostly concerns US politics –...
View ArticleLWN.net: [$] Permissive licenses, community, and copyleft
On the final day of LinuxCon Europe 2015, HP's Chief Technology Officer Martin Fink delivered a bold keynote about software licensing. Fink recapped the negative effects of license proliferation and...
View ArticleGrigor Gatchev - A Weblog: Зареформаторитеиреформите
На миналите избори гласувах за Реформаторския блок. Заради Иво Божков – юнакът, който отразяваше пряко в Интернет протестите, показваше нещата както са и отнасяше за това ненавистта на насъскани...
View ArticleMarian Marinov/HackMan: Placky – my traffic monitoring system
Recently I wanted to check if I have reached the limit of my network connection. However I constatly had to login on my router and check the traffic on each interface… and I had to watch it...
View Article