AWS Official Blog: Next Stop, Korea!
The region-based AWS model has proven to be a good match for the needs of our global customer base. We have always believed that you need to be able to exercise complete control over where your data is...
View ArticleErrata Security: We should all follow Linus’s example
Yet another Linus rant has hit the news, where he complains about how "your shit code is fucking brain damaged". Many have complained about his rudeness, how it's unprofessional, and part of the...
View ArticleSANS Internet Storm Center, InfoCON: green: Malicious spam with links to...
Introduction Since Monday 2015-10-26, weve noticed a particular campaign sending malicious spam (malspam) with links to download CryptoWall 3.0 ransomware. This campaign has been impersonating domain...
View ArticleLWN.net: [$] LWN.net Weekly Edition for November 5, 2015
The LWN.net Weekly Edition for November 5, 2015 is available.
View ArticleSANS Internet Storm Center, InfoCON: green: ISC StormCast for Thursday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleKrebs on Security: TalkTalk, Script Kids & The Quest for ‘OG’
So you've got two-step authentication set up to harden the security of your email account (you do, right?). But when was the last time you took a good look at the security of your inbox's recovery...
View ArticleTorrentFreak: U.S. Asks Judge to Rule Kim Dotcom’s Evidence Inadmissible
As Kim Dotcom's extradition hearing defense continues, the U.S. government has just asked the presiding judge to rule all of the Megaupload founder's evidence inadmissible. However, Dotcom informs...
View ArticleSchneier on Security: The Effects of Surveillance on the Victims
Last month, the Cato Institute held its Second Annual Cato Surveillance Conference. It was an excellent event, with many interesting talks and panels. But their was one standout: a panel by victims of...
View ArticleRaspberry Pi: Raspberry Pi Creative Technologists: openFrameworks
A big part of my role at the Foundation is running the Raspberry Pi Creative Technologists programme. Over 12 months we take a small group of young people aged 16-21 years through field trips, hack...
View ArticleTorrentFreak: Google’s “Pirate Update” Fails to Punish Streaming Sites
A new report released by streaming search engine JustWatch has revealed that Google's "Pirate Update" drastically decreased the visibility of torrent sites in search results. However, the algorithm...
View Articleyovko in a nutshell: Signal
Реших да редуцирам каналите си за връзка, най-вече по отношение на всевъзможните messenger-и за директни съобщения. Винаги предпочитам електронната поща за основна комуникация, понеже мога да подреждам...
View ArticleAWS Security Blog: How to Protect the Integrity of Your Encrypted Data by...
One of the most important and critical concepts in AWS Key Management Service (KMS) for advanced and secure data usage is EncryptionContext. Using EncryptionContext properly can help significantly...
View ArticleLWN.net: Security advisories for Thursday
CentOS has updated firefox (C7; C6; C5: multiple vulnerabilities), nspr (C7; C6; C5: code execution), nss (C7; C6; C5: code execution), and nss-util (C7; C6: code execution). Debian has updated...
View ArticleSchneier on Security: Passwords by Mail
Julia Angwin's daughter is selling diceware passwords by mail.
View ArticleTorrentFreak: YTS / YIFY Signs Unprecedented Settlement With MPAA
For several years YTS/YIFY has been one of Hollywood's biggest arch-rivals but both sides came to an unprecedented agreement in recent weeks. Instead of going to trial over the alleged widespread...
View ArticleGattaNegra's days: Демон, Юда и Магьосник
Нямам думи изобщо да опиша това изживяване, но ще се опитам. Стигнах до последната страница преди четвърт час, но ми трябваше малко време, за да изплувам от историята. Сякаш съм изяла една огромна...
View ArticleLWN.net: The kernel of the argument (Washington Post)
Here's a lengthy Washington Post feature on the security (or lack thereof) of the Linux kernel; it features a number of familiar names. "Even many Linux enthusiasts see a problem with this from a...
View ArticleLWN.net: Kernel Self Protection Project
Kees Cook has announced the Kernel Self Protection Project, which is meant to be "a community of people to work on the various kernel self-protection technologies (most of which are found in PaX and...
View Articlexkcd.com: MarketWatch
This post was syndicated from: xkcd.com and was written by: xkcd.com. Original post: at xkcd.com
View ArticleSANS Internet Storm Center, InfoCON: green: ISC StormCast for Friday,...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View Article