Raspberry Pi: Disabling drones with a Raspberry rifle
About a million of you emailed us over the weekend about this new implementation of the Raspberry Pi, in a rifle-shaped device which the US Army’s Cyber Institute appears to have made in order to shoot...
View ArticleSchneier on Security: How to Commandeer a Store PA System
If you call the proper phone extension, you have complete control over the public address system at a Target store.
View ArticleBeyond Bandwidth: Special What? Why you should care about the FCC’s Special...
A lot of “special” things are…well… special. The Special Olympics are incredibly meaningful. I love a good holiday special on TV. And what would a Big Mac be without that “Special Sauce,” whatever it...
View ArticleAWS Official Blog: AWS Week in Review – October 12, 2015
Let’s take a quick look at what happened in AWS-land last week: Monday October 12 The published a Amazon EC2 Container Service at AWS re:Invent Wrap-up. I invited you to Learn About the Newest AWS...
View ArticleLWN.net: Security updates for Monday
Arch Linux has updated flashplugin (multiple vulnerabilities), miniupnpc (code execution), and spice (multiple vulnerabilities). Debian has updated owncloud (multiple vulnerabilities). Debian-LTS has...
View ArticleTorrentFreak: Dozens of Pirate Domains Quietly Added to UK ISP Blocklists
Dozens of new domains have quietly been added to the UK's unofficial 'pirate' block list. In addition to blacklisting several Popcorn Time related URLs, plenty of torrent, streaming and proxy...
View ArticleDarknet - The Darkside: OWASP WebGoat – Deliberately Insecure Web Application
WebGoat is a deliberately insecure web application maintained by OWASP designed to teach web application security lessons. This program is a demonstration of common server-side application flaws. The...
View ArticleKrebs on Security: Don’t Be Fooled by Fake Online Reviews Part II
In July I wrote about the dangers of blindly trusting online reviews, especially for high-dollar services like moving companies. That piece told the story of Full Service Van Lines, a moving company...
View ArticleErrata Security: DEF CON drink-off — for science!
The DEF CON hacking conference is a mixture of techies and drinkers. I propose we exploit this for science. Specifically, we should take a look at vodka. Vodka is just ethanol and water with all taste...
View ArticleLWN.net: Sonic Pi uses code to compose a dance party (Opensource.com)
Opensource.com has an interview with Sam Aaron, creator of Sonic Pi. "Sonic Pi is a musical instrument that happens to use code as its interface. It's also a programming environment that happens to be...
View ArticleAnchor Cloud Hosting: 5 steps to prevent your website getting hacked
I want to clear this up right from the start. No matter how security conscious you are, your website can always be hacked. In fact, if security isn’t really on your radar and you’re not already taking...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC StormCast for Tuesday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleВелоеволюция: Софийски вело избори 2015
Успяхте ли да разберете какво готвят партиите за велосипедистите в София през идния мандат? Уверени ли сте в тяхната подготовка и заявени намерения? Можете ли да гласувате велосипедно? Ние сме объркани...
View ArticleSANS Internet Storm Center, InfoCON: green: When encoding saves the day,...
Out of most penetration tests I do, XSS vulnerabilities are still probably the most common ones we encounter (if I dont count missing Secure and HttpOnly flags on cookies :)). Even web application...
View Article[Медийно право] [Нели Огнянова] : Снимки на публични фигури: Жули Гайе
Франсоа Жерар Жорж Никола Оланд е седми президент на Френската република и Принц на Андора. Дълги години живее със Сеголен Роаял, по-късно има връзка с журналистката Валери Трирвильор, а преди време...
View ArticleThe diaspora* blog: diaspora* version 0.5.4.0 released
As planned, a new minor release following the new release schedule is now released. Over the past six weeks, we have managed to collect 90 commits made by 12 contributors for this minor release. A huge...
View ArticleTorrentFreak: Police Seized a Torrent Proxy & 33K Users Kept Accessing it
In 2014, police arrested a man and effectively took control of his torrent site unblocking proxy. Worryingly, it now transpires that people still have their browsers configured to use it. With...
View ArticleRaspberry Pi: Astro Pi: Mission Update 7 – Launch Vehicle Changed
This December, British ESA Astronaut Tim Peake will be taking two specially augmented Raspberry Pis called Astro Pis to the International Space Station (ISS) as part of his six-month mission. These...
View ArticleAWS Security Blog: How to Configure Security Settings in Amazon WorkDocs
Amazon WorkDocs (formerly Amazon Zocalo) is a fully managed, secure enterprise storage and sharing service that incorporates feedback capabilities to improve user productivity. You can comment on...
View ArticleTorrentFreak: BrowserPopcorn Shut Down By the MPAA, Dev Says
A new Popcorn Time-like service has reportedly been shut down by the MPAA. BrowserPopcorn utilized components used by the regular Popcorn Time and placed them in a browser, but after just a couple of...
View Article