Showing headlines posted by penguinist

« Previous ( 1 2 3 4 ... 5 ) Next »

House Passes Bill to Sabotage Net Neutrality

In a disappointing turn of events, the U.S. House of Representatives voted 241 to 173 to pass H.R. 2666, the No Rate Regulation of Broadband Internet Access Act, a bill that would undermine the FCC’s ability to enforce key net neutrality protections... As the bill moves to the Senate this session, it’s crucial that senators reject it. Fortunately, President Obama has said that he will veto the bill if it reaches his desk.

How Canadian Police Intercept and Read Encrypted BlackBerry Messages

  • motherboard; By Jordan Pearson & Justin Ling (Posted by penguinist on Apr 18, 2016 4:14 AM EDT)
  • Story Type: Security
While Apple recently fought the US Department of Justice in court over an order to create new software to help unlock a terror suspect’s phone—and has pledged to continue to do so—Canada’s police and device manufacturers have been comparatively silent on the issue. Now, for the first time, Canadians have a clearer picture of how digital surveillance in this country works, at least when it comes to BlackBerry phones...

Congress's New Encryption Bill Just Leaked, And It's As Bad As Experts Imagined

  • Motherboard; By Joshua Kopstein (Posted by penguinist on Apr 11, 2016 10:34 AM EDT)
  • Story Type: Security
In the aftermath of Apple and the FBI's high-profile battle over an iPhone used by one of the San Bernardino shooter suspects, observers on Capitol Hill have been anxiously awaiting the arrival of new Congressional bill that would force tech companies to provide assistance... Now a leaked draft reportedly obtained by The Hill has provided our very first glimpse at that bill... The bill "would be embarrassing if it weren’t so frightening"

The Best Things in Life are Free

  • The Cornell Daily Sun; By Eric Schulman (Posted by penguinist on Apr 11, 2016 5:52 AM EDT)
  • Story Type: Editorial
Open source software is software that is distributed freely. Now, this may sound like a terrible idea. People are altruistic — but only to a certain point. Why would people contribute to software for no reward? The key is that open source software is not only free, the process behind making it is transparent. You can change it. Open source projects start when people share code they wrote for their individual needs. Many times making this software publicly available is more cost effective than selling it.

Torvalds prepared to spend next 25 years helping Linux conquer the desktop

"I would obviously love for Linux to take over that world too, but it turns out it's a really hard area to enter. I'm still working on it. It's been 25 years. I can do this for another 25. I'll wear them down."

A Government Error Just Revealed Snowden Was the Target in the Lavabit Case

  • Wired; By Kim Zetter (Posted by penguinist on Mar 22, 2016 9:52 AM EDT)
  • Story Type: Security
It’s been one of the worst-kept secrets for years: the identity of the person the government was investigating in 2013 when it served the secure email firm Lavabit with a court order demanding help spying on a particular customer...

Inside the Starburst-sized box that could save the Internet

  • Tech Crunch; By Michael Pozmantier (Posted by penguinist on Mar 20, 2016 7:45 PM EDT)
  • Story Type: Security
Companies can encrypt data so that what is stolen remains useless to the attacker. However, right now, most forms of cryptography can be broken with the right tools — but what if there were a development in the works that could change the game completely?

Secure Messaging Scorecard

  • Electronic Frontier Foundation (Posted by penguinist on Mar 18, 2016 1:34 PM EDT)
  • Story Type: Security
In the face of widespread Internet surveillance, we need a secure and practical means of talking to each other from our phones and computers. Many companies offer “secure messaging” products—but are these systems actually secure? We decided to find out, in the first phase of a new EFF Campaign for Secure & Usable Crypto.

US government pushed tech firms to hand over source code

The US government has made numerous attempts to obtain source code from tech companies in an effort to find security flaws that could be used for surveillance or investigations.

How to foil a bank heist

Newspapers have reported that a “zero-day” vulnerability was used to accomplish the hacking of Bangladesh Bank, which has so far cost the country about $100 million -- a colossal amount.

How the FBI will lose its iPhone fight, thanks to 'West Coast Law'

  • The Register; By Dana Blankenhorn (Posted by penguinist on Mar 6, 2016 9:33 PM EDT)
  • Story Type: Editorial
Snowden says we can't trust government with our secrets, and we don't have to. You might as well pass a law telling glaciers not to melt. We all want our privacy and security. West Coast Law says the only way you get it is if everyone does.

Best Smart TV OS: Android TV vs Firefox TV vs Tizen vs WebOS

Before purchasing a new Smart TV, make sure that its operating system suits your everyday needs. To help you choose wisely, here’s our handy guide to what each one looks like, and what features it packs.

Mozilla Jumps On IoT Bandwagon

Mozilla has been clarifying some of its plans to convert the Firefox OS project into four IoT based projects.

Latest attack against TLS shows the pitfalls of intentionally weakening encryption

  • cso online; By Lucian Constantin (Posted by penguinist on Mar 3, 2016 1:07 PM EDT)
  • Story Type: Security
Following FREAK and Logjam, DROWN is the third attack resulting from encryption algorithms that were deliberately weakened by the government

RSA president slams crypto backdoors as useful only against petty criminals

  • Network World; By Tim Greene (Posted by penguinist on Mar 3, 2016 11:13 AM EDT)
  • Story Type: Security
The idea of making end-to-end encryption breakable is “so misguided as to boggle the mind,” according to Amit Yoran, the president of RSA. He says it will “catastrophically weaken” security for those using it for legitimate purposes without accomplishing the goals for which it is sought – catching terrorists and the worst criminals. “It is solely for the ease and convenience of law enforcement when pursuing petty criminals,” he says, while the toughest adversaries would be unaffected.

Odroid-C2 Released

The Odroid-C2 64-bit quad-core single board computer is now released. The C2 features 2GB memory, Gigabit ethernet, infrared receiver, 40-pin GPIO connector, OpenGL Mali-450 GPU and with AVE support for H264/H265 HDMI 2.0 4K/60Hz display.

Raspberry Pi 3 With WiFi And Bluetooth

Details of the next member of the successful Raspberry Pi family have become available as part of FCC testing documents. The Pi 3 finally includes WiFi and Bluetooth LE.

Meizu PRO 5 Ubuntu Edition available for pre-order now

The Meizu PRO 5 Ubuntu Edition will be showcased for the very first time at Mobile World Congress 2016 in Barcelona... As VP at Meizu, Li Nan, puts it “We have some interesting plans and so we’re looking forward to further deepening our partnership with Canonical in the future.” We look forward to an exciting future together.

Ubuntu Phone to Add Fingerprint Unlocking

  • OMG!Ubuntu; By Joey-Elijah Sneddon (Posted by penguinist on Feb 20, 2016 4:33 PM EDT)
  • Groups: Mobile, Ubuntu
Ubuntu is to work on adding support for a new fingerprint authentication API in mobile builds

CVE-2015-7547: glibc getaddrinfo stack-based buffer overflow

  • Google Online Security Blog; By Fermin Serna, ... (Posted by penguinist on Feb 16, 2016 6:11 PM EDT)
  • Story Type: Security; Groups: Linux
The glibc DNS client side resolver is vulnerable to a stack-based buffer overflow when the getaddrinfo() library function is used. Software using this function may be exploited with attacker-controlled domain names, attacker-controlled DNS servers, or through a man-in-the-middle attack.

« Previous ( 1 2 3 4 ... 5 ) Next »