Schneier on Security: Research on The Trade-off Between Free Services and...
New report: "The Tradeoff Fallacy: How marketers are misrepresenting American consumers and opening them up to exploitation." New Annenberg survey results indicate that marketers are misrepresenting a...
View ArticleRaspberry Pi: Diddyborg metal edition
We had some special visitors at Pi Towers a few weeks ago: the PiBorg folks, makers of some pretty terrifying Pi-based robots. Here’s Eben, charging off into the sunset on their largest robot. We made...
View ArticleTorrentFreak: MPAA: Google Assists and Profits from Piracy
The MPAA is refusing to hand over documentation discussing the legal case it helped Mississippi State Attorney General Jim Hood build against Google. According to the Hollywood group, Google is waging...
View ArticleКлошкодил: 2015-06-17 разни мрежови
не-Курсът по системна/мрежова администрация води до доста интересни открития. Cisco IOS 12.2(11)T9 в/у 2600 (последния IOS, който има за тоя device, който мога да събера в моя flash/памет и в който има...
View ArticleLWN.net: [$] Leap-second issues, 2015 edition
The leap second is an occasional ritual wherein Coordinated Universal Time (UTC) is held back for one second to account for the slowing of the Earth's rotation. The last leap second happened on June...
View ArticleLWN.net: Security advisories for Wednesday
Debian-LTS has updated linux-2.6 (multiple vulnerabilities). Red Hat has updated kernel (RHEL5.9: privilege escalation). SUSE has updated java-1_7_0-ibm (SLE12: multiple vulnerabilities). Ubuntu has...
View ArticleKrebs on Security: Critical Flaws in Apple, Samsung Devices
Normally, I don't cover vulnerabilities about which the user can do little or nothing to prevent, but two newly detailed flaws affecting hundreds of millions of Android, iOS and Apple products probably...
View ArticleErrata Security: How would you use Lua scripting in a DNS server?
I'm currently putting Lua into a DNS server, and I'm trying to figure out how people would use it.A typical application would be load-balancing. How I would do this is to create a background Lua thread...
View ArticleSchneier on Security: Hacking Drug Pumps
When you connect hospital drug pumps to the Internet, they're hackable -- only surprising people who aren't paying attention. Rios says when he first told Hospira a year ago that hackers could update...
View ArticleLWN.net: Cool new features coming to Blender 2.75 (Opensource.com)
Opensource.com takes a look at the upcoming release of Blender 2.75. "One of the biggest features merged into Blender this go-round were from the multiview branch. In short, Blender now fully supports...
View ArticleLWN.net: [$] Micro Python on the pyboard
A 2013 Kickstarter project brought us Micro Python, which is a version of Python 3 for microcontrollers, along with the pyboard to run it on. Micro Python is a complete rewrite of the interpreter that...
View ArticleLauren Weinstein's Blog: Falling Into the Encryption Trap
This is a difficult discussion for me. It borders on embarrassing, because I'm forced to admit that I was unable to foresee some of the ramifications of encryption-related polices I've been promoting...
View ArticleTorrentFreak: Netflix VPN Problem? Leave Consumers Alone, Aussie Minister Says
As Australia's site blocking Bill took a step closer to becoming law yesterday, Communications Minister Malcolm Turnbull made it extra clear that VPN use won't be a problem under the legislation....
View ArticleDarknet - The Darkside: Apple’s Password Storing Keychain Cracked on iOS & OS X
And another password shocker, a few days after ‘cloud’ password service LastPass was pretty seriously hacked (yah if you’re using it, change your master password) critical 0-day flaws in Apple’s...
View ArticleLWN.net: [$] LWN.net Weekly Edition for June 18, 2015
The LWN.net Weekly Edition for June 18, 2015 is available.
View ArticleSANS Internet Storm Center, InfoCON: green: ISC StormCast for Thursday, June...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleRaspberry Pi: Flappy Brain
Alex Eames from Raspi.TV has done my job for me today: here’s a video interview with Albert “Winkleink” Hickey from this month’s Cambridge Raspberry Jam, and a demo of his simply outrageous Flappy...
View ArticleTorrentFreak: Trolls Want to Interrogate BitTorrent ‘Pirates’ By Phone
The company behind the Oscar-winning movie Dallas Buyers Club wants to interrogate alleged BitTorrent pirates over the phone. In order to assess how much to 'fine' individuals, Voltage Pictures wants...
View ArticleSchneier on Security: Counterfeit Social Media Accounts
Interesting article on the inner workings of a Facebook account farm, with commentary on fake social media accounts in general.
View ArticleKrebs on Security: OPM’s Database for Sale? Nope, It Came from Another US .Gov
A database supposedly from a sample of information stolen in the much publicized hack at the Office of Personnel Management (OPM) has been making the rounds in the cybercrime underground, with some...
View Article