Quantcast
Channel: Noise
Browsing all 38368 articles
Browse latest View live

Schneier on Security: Research on The Trade-off Between Free Services and...

New report: "The Tradeoff Fallacy: How marketers are misrepresenting American consumers and opening them up to exploitation." New Annenberg survey results indicate that marketers are misrepresenting a...

View Article


Raspberry Pi: Diddyborg metal edition

We had some special visitors at Pi Towers a few weeks ago: the PiBorg folks, makers of some pretty terrifying Pi-based robots. Here’s Eben, charging off into the sunset on their largest robot. We made...

View Article


TorrentFreak: MPAA: Google Assists and Profits from Piracy

The MPAA is refusing to hand over documentation discussing the legal case it helped Mississippi State Attorney General Jim Hood build against Google. According to the Hollywood group, Google is waging...

View Article

Клошкодил: 2015-06-17 разни мрежови

не-Курсът по системна/мрежова администрация води до доста интересни открития. Cisco IOS 12.2(11)T9 в/у 2600 (последния IOS, който има за тоя device, който мога да събера в моя flash/памет и в който има...

View Article

LWN.net: [$] Leap-second issues, 2015 edition

The leap second is an occasional ritual wherein Coordinated Universal Time (UTC) is held back for one second to account for the slowing of the Earth's rotation. The last leap second happened on June...

View Article


LWN.net: Security advisories for Wednesday

Debian-LTS has updated linux-2.6 (multiple vulnerabilities). Red Hat has updated kernel (RHEL5.9: privilege escalation). SUSE has updated java-1_7_0-ibm (SLE12: multiple vulnerabilities). Ubuntu has...

View Article

Krebs on Security: Critical Flaws in Apple, Samsung Devices

Normally, I don't cover vulnerabilities about which the user can do little or nothing to prevent, but two newly detailed flaws affecting hundreds of millions of Android, iOS and Apple products probably...

View Article

Errata Security: How would you use Lua scripting in a DNS server?

I'm currently putting Lua into a DNS server, and I'm trying to figure out how people would use it.A typical application would be load-balancing. How I would do this is to create a background Lua thread...

View Article


Schneier on Security: Hacking Drug Pumps

When you connect hospital drug pumps to the Internet, they're hackable -- only surprising people who aren't paying attention. Rios says when he first told Hospira a year ago that hackers could update...

View Article


LWN.net: Cool new features coming to Blender 2.75 (Opensource.com)

Opensource.com takes a look at the upcoming release of Blender 2.75. "One of the biggest features merged into Blender this go-round were from the multiview branch. In short, Blender now fully supports...

View Article

LWN.net: [$] Micro Python on the pyboard

A 2013 Kickstarter project brought us Micro Python, which is a version of Python 3 for microcontrollers, along with the pyboard to run it on. Micro Python is a complete rewrite of the interpreter that...

View Article

Lauren Weinstein's Blog: Falling Into the Encryption Trap

This is a difficult discussion for me. It borders on embarrassing, because I'm forced to admit that I was unable to foresee some of the ramifications of encryption-related polices I've been promoting...

View Article

TorrentFreak: Netflix VPN Problem? Leave Consumers Alone, Aussie Minister Says

As Australia's site blocking Bill took a step closer to becoming law yesterday, Communications Minister Malcolm Turnbull made it extra clear that VPN use won't be a problem under the legislation....

View Article


Image may be NSFW.
Clik here to view.

Darknet - The Darkside: Apple’s Password Storing Keychain Cracked on iOS & OS X

And another password shocker, a few days after ‘cloud’ password service LastPass was pretty seriously hacked (yah if you’re using it, change your master password) critical 0-day flaws in Apple’s...

View Article

LWN.net: [$] LWN.net Weekly Edition for June 18, 2015

The LWN.net Weekly Edition for June 18, 2015 is available.

View Article


SANS Internet Storm Center, InfoCON: green: ISC StormCast for Thursday, June...

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article

Raspberry Pi: Flappy Brain

Alex Eames from Raspi.TV has done my job for me today: here’s a video interview with Albert “Winkleink” Hickey from this month’s Cambridge Raspberry Jam, and a demo of his simply outrageous Flappy...

View Article


TorrentFreak: Trolls Want to Interrogate BitTorrent ‘Pirates’ By Phone

The company behind the Oscar-winning movie Dallas Buyers Club wants to interrogate alleged BitTorrent pirates over the phone. In order to assess how much to 'fine' individuals, Voltage Pictures wants...

View Article

Schneier on Security: Counterfeit Social Media Accounts

Interesting article on the inner workings of a Facebook account farm, with commentary on fake social media accounts in general.

View Article

Krebs on Security: OPM’s Database for Sale? Nope, It Came from Another US .Gov

A database supposedly from a sample of information stolen in the much publicized hack at the Office of Personnel Management (OPM) has been making the rounds in the cybercrime underground, with some...

View Article
Browsing all 38368 articles
Browse latest View live