SANS Internet Storm Center, InfoCON: green: We set up a simple test page to...
--- Johannes B. Ullrich, Ph.D. STI|Twitter|LinkedIn (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleAWS Official Blog: New AWS Public Data Set – Real-Time and Archived NEXRAD...
My colleague Ariel Gold wrote the guest post below to introduce the newest AWS Public Data Set. — Jeff; You can now access real-time and archival NEXRAD weather radar data as an AWS Public Data Set....
View ArticleAWS Security Blog: New Tabbed Organization of Your Resources in the IAM Console
Today, AWS Identity and Access Management (IAM) enhanced the IAM console user interface to make it easier to view details about your users, groups, roles, and policies (“IAM entities”). The detail...
View ArticleAWS Compute Blog: Using Python in an AWS Lambda Function
Tim Wagner, AWS Lambda REVISED: Python 2.7 is now a first-class language in AWS Lambda…no workarounds required!
View ArticleApplication Management Blog: Now Available: Videos and Slide Decks from AWS...
Want to review an AWS OpsWorks session you attended at this year’s re:Invent or experience OpsWorks for the first time? Check out these re:Invent videos and slide decks. DVO301 - AWS OpsWorks Under...
View ArticleLWN.net: [$] The Dirk and Linus show comes to Seoul
One of the recurring features of Linux Foundation events is an on-stage discussion between Dirk Hohndel and Linus Torvalds on a variety of kernel-related topics. The Korea Linux Forum in Seoul, South...
View Articlexkcd.com: Launch Status Check
This post was syndicated from: xkcd.com and was written by: xkcd.com. Original post: at xkcd.com
View ArticleSANS Internet Storm Center, InfoCON: green: Adobe Releases Surprise Shockwave...
Adobe today released a surprise patch for Shockwave [1]. The patch fixes one vulnerability,CVE-2015-7649 and Adobes Shockwave Player on Windows and OS X is affected. The vulnerability is used in...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC StormCast for Wednesday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleTorrentFreak: Spotify Helps to Beat Music Piracy, European Commission Finds
New research published by the European Commission's Joint Research Centre shows that Spotify is helping to beat piracy. The researchers examined the effects of legal streaming on torrent downloads and...
View ArticleSchneier on Security: The Doxing Trend
If the director of the CIA can't keep his e-mail secure, what hope do the rest of us have -- for our e-mail or any of our digital information? None, and that's why the companies that we entrust with...
View ArticleLWN.net: [$] Running a mainline kernel on a cellphone
One of the biggest freedoms associated with with free software is the ability to replace a program with an updated or modified version. Even so, of the many millions of people using Linux-powered...
View ArticleSANS Internet Storm Center, InfoCON: green: Victim of its own success and...
This morning, I faced an interesting case. We were notified that one of our computers was doing potentially malicious HTTP requests. The malicious URL was: api.wipmania.com. We quickly checked and...
View ArticleLWN.net: Security advisories for Wednesday
CentOS has updated qemu-kvm (C7: denial of service). Debian has updated openjdk-7 (multiple vulnerabilities) and php5 (two vulnerabilities). openSUSE has updated squid (13.2, 13.1: nonce replay...
View ArticleDarknet - The Darkside: FBI Recommends Crypto Ransomware Victims Just Pay
Crypto ransomware is a type of malware that holds you ransom by encrypting your files and has been around for a while, but the FBI recently said at a cyber security summit that they advise companies...
View ArticleTorrentFreak: Legality of Voluntary ‘Pirate’ Site Blocking Regime Under Fire
Following the mass blocking of more than 50 alleged pirate sites in Portugal this week, lawyers are questioning the legality of the action. Since the mechanism to bar the sites is through voluntary...
View ArticleLWN.net: Tor: a landmark for hidden services
The Tor Project's .onion (hidden services) addresses have been formally approved as a Special Use Domain Name by the Internet Engineering Task Force (IETF). "[Jacob] Appelbaum, a security researcher...
View ArticleSchneier on Security: Why Is the NSA Moving Away from Elliptic Curve...
In August, I wrote about the NSA's plans to move to quantum-resistant algorithms for its own cryptographic needs. Cryptographers Neal Koblitz and Alfred Menezes just published a long paper speculating...
View ArticleErrata Security: OMG, the machines are breeding! Mankind is doomed! DOOMED!!!
My Tesla has the same MAC address vendor code as an AR Drone. These are two otherwise unrelated companies, yet they share the same DNA. Flying drones are mating with land-based autonomous vehicles. We...
View ArticleAWS Official Blog: EC2 VPC VPN Update – NAT Traversal, Additional Encryption...
You can use to create a logically isolated section of the AWS Cloud. Within the VPC, you can define your desired IP address range, create subnets, configure route tables, and so forth. You can also use...
View Article