Category: Security & Privacy

  • Docker 1.10

    Docker announced version 1.10 past week. The new release contains more than 100 improvements over the previous version. New features include better resource management, a more flexible docker-compose file format and improvements to security. These are in particular through user namespace isolation, implementation of seccomp for syscall filtering and an authorization plugin to restrict access…

  • Passweird 

    Correct Horse Battery Staple. But in gross. With Passweird. Passweird – Passwords too Gross to Steal Quelle: Passweird – Passwords too Gross to Steal

  • State of Internet of things security

    Forrester, well known for their predictions on the impact of technology, took a look at the state of Internet of Things Security. To no surprise they came to the conclusion the technology still has to come a long way.   Forrester’s take on the Internet of things isn’t that shocking–the industry has developed with little thought about…

  • Internet of Things security

    Security on the Internet of things has often been said to be bad. Apparently Shodan runs a search engine for sleeping kids. Through kids monitor cams available to watch. Publicly on the internet. Enough proof the Internet of Things really needs security.  Shodan search engine is only the latest reminder of why we need to fix IoT…

  • Americans are actually starting to pay with their phones

    Americans are actually starting to pay with their phones Something that is not yet imaginable in Europe, that has not even adopted Credit Cards in large areas. via: Americans are actually starting to pay with their phones

  • Wireshark 2.0 Released, UI Rewritten In Qt5

    After 2 years of development, Wireshark 2.0 Released, UI Rewritten In Qt5 – writes Phoronix

  • Attribution

    While visiting the “Techdays Munich: Cyber Security“, the hashtag #6wordcyber was trending on Twitter. And during the talk about a new security law, the following tweet caught my eye: https://twitter.com/Orph30/status/656105774322700288 It is well known in the security community that attribution is hard. Attacks do usually not leave enough evidence to attribute it to a specific…

  • A tale of software maintenance: OpenSSL and EVP_CHECK_DES_KEY

    A tale of software maintenance: OpenSSL and EVP_CHECK_DES_KEY

  • Your home router.

    If you don’t patch that device, somebody else may. Says Symantec.

  • APPLE’S XCODEGHOST FAQ

    We have no information to suggest that the malware has been used to do anything malicious or that this exploit would have delivered any personally identifiable information had it been used. FAQ.