Backblaze Blog | The Life of a Cloud Backup Company: Welcome Chuck: Our...
Some say that all things in life are cyclical. Backblaze pioneered DIY server architecture on a large scale with the Backblaze Storage Pods. This in turn spurred Facebook to start their Open Compute...
View ArticleLWN.net: Security advisories for Monday
Arch Linux has updated drupal (open redirect vulnerability). Debian has updated gdk-pixbuf (two vulnerabilities), miniupnpc (code execution), and mysql-5.5 (multiple vulnerabilities). Debian-LTS has...
View ArticleTorrentFreak: YIFY / YTS May Be Gone For Good
After nearly a week of silence YTS is still offline, and associated movie release group YIFY hasn't put out any new films either. While many torrent sites regularly suffer downtime, the complete lack...
View ArticleSchneier on Security: Ravens Can Identify Cheaters
Ravens have been shown to identify and remember cheaters among their unkindness.
View ArticleLWN.net: KDevelop 5.0.0 beta available
The first beta release of KDevelop 5.0.0 is available. The code base has been ported to Qt 5 and KDE frameworks 5, the legacy C++ parser and semantic analysis plugin has been replaced with a much more...
View ArticleSANS Internet Storm Center, InfoCON: green: Typo Squatting Charities for Fake...
Joe wrote this weekend that: A customer called me yesterday to make me aware of their computer that was compromised by one of those scam websites, that pops up an 800 numbers and tells them to call....
View ArticleAWS Official Blog: AWS Week in Review – October 19, 2015
Let’s take a quick look at what happened in AWS-land last week: Monday October 19 Eric Hammond showed you how to Protect Critical SNS Topics from Deletion. ElasticBox shared some IT Insights from AWS...
View ArticleRaspberry Pi: Raspberry Pi projects for Halloween 2015
It’s Halloween this Saturday, and people have been showing off their spooky Raspberry Pi projects as they prepare to startle the heck out of friends, neighbours and fellow party-goers. We thought we’d...
View ArticleAWS Official Blog: New EC2 Run Command – Remote Instance Management at Scale
When you move from a relatively static and homogeneous computing environment where you have a small number of persistent, well-known servers (or instances, using terminology) to a larger and more...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC StormCast for Tuesday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleDarknet - The Darkside: Infernal Twin – Automatic Wifi Hacking Tool
Infernal Twin is an automatic wifi hacking tool, basically a Python suite created to aid penetration testers during wireless assessments, it automates many of the common attacks – which can get...
View ArticleLWN.net: Four more stable kernel updates
The 4.2.5, 4.1.12, 3.14.56, and 3.10.92 stable kernels are available; each contains another set of important fixes.
View ArticleSANS Internet Storm Center, InfoCON: green: The "Yes, but…"...
This weekend, I worked on a pentest report that was already pending for a while. Im honest: Im lazzy to write reports (like many of us, no?).During a pentest, it is mandatory to keep evidences of all...
View ArticleTorrentFreak: Orwell Estate Sends Copyright Takedown Over the Number “1984”
The Orwell estate is cracking down on people who dare to use the number "1984" without permission. In a truly Orwellian move they have sent a takedown request, targeting an Internet radio host, for...
View ArticleTorrentFreak: EU Adopts ‘Net Neutrality’ Rules, Keeps Loopholes Open
The European Parliament adopted Europe's first net neutrality rules today, as part of the new telecoms package. However, many net neutrality proponents see the new regulation as a loss rather than a...
View ArticleSchneier on Security: The Need for Transparency in Surveillance
In Data and Goliath, I talk about the need for transparency, oversight, and accountability as the mechanism to allow surveillance when it is necessary, while preserving our security against excessive...
View ArticleLWN.net: Tuesday’s security updates
Arch Linux has updated vorbis-tools (denial of service). CentOS has updated ntp (C7; C6: two vulnerabilities). Debian-LTS has updated libxml2 (regression in previous update). Mageia has updated...
View ArticleKrebs on Security: Cybersecurity Information (Over)Sharing Act?
The U.S. Senate is preparing to vote on cybersecurity legislation that proponents say is sorely needed to better help companies and the government share information about the latest Internet threats....
View ArticleTorrentFreak: Aurous Offers to Shut Down But RIAA Isn’t Interested
Following an attempt by its developer to completely open-source Aurous this past weekend, the RIAA says a court order which bans distribution of the controversial software has been violated. Aurous has...
View ArticleLWN.net: EFF Wins Petition to Inspect and Modify Car Software
The Electronic Frontier Foundation reports that the Librarian of Congress has granted security researchers and others the right to inspect and modify the software in their cars and other vehicles. "EFF...
View Article