Hackin9

Lavabit, secure email? Hardly, says infosec wizard Moxie Marlinspike
Register
Former Lavabit proprietor Ladar Levison claims the new Dark Mail initiative he's cooking up with the team from Silent Circle will enable email that's virtually spy-proof, but according to at least one expert, the original Lavabit service was never all ...

and more »
 
Enterprise open-source software vendor Red Hat is keeping an eye on the development of 64-bit ARM processors for servers, building up expertise in case the nascent platform takes hold in the data center.
 
The rocky rollout of Windows 8.1 should serve as a reminder for consumers, software developers, hardware vendors, enterprise IT pros and Microsoft itself that a period of careful testing and analysis must precede the release and installation of an operating system update.
 
LinuxSecurity.com: Several security issues were fixed in the kernel.
 
LinuxSecurity.com: Several security issues were fixed in the kernel.
 
LinuxSecurity.com: Several security issues were fixed in the kernel.
 
LinuxSecurity.com: Several security issues were fixed in the kernel.
 
LinuxSecurity.com: Several security issues were fixed in the kernel.
 
LinuxSecurity.com: Several security issues were fixed in the kernel.
 
LinuxSecurity.com: Several security issues were fixed in the kernel.
 
LinuxSecurity.com: Several security issues were fixed in the kernel.
 
Despite the frothy headlines stirred by Twitter's initial public offering, tech is not in a bubble of the sort that arose before the 2000 dot-com crash.
 
Facebook and Microsoft are winning plaudits from security researchers for launching an initiative to offer bounties to bug hunters who discover and report vulnerabilities in widely used products.
 
The Edward Snowden saga continues to serve up valuable lessons on the dangers posed to enterprise data by insiders with privileged access to systems and networks. The latest lesson involves the risks of allowing password sharing among employees.
 
IBM was accused by a federal court of "gamesmanship" in its bid for the CIA's cloud computing contract. The accusation is part of a ruling unsealed Friday.
 
Researchers have found a way for the first time to tune the radio frequency in smartphones and other wireless devices, promising reduced costs and higher performance for semiconductors used in defense, satellite and commercial communications.
 
Scientists have found a way to power future robots using an unusual source -- urine.
 

Re: Tizen: The next big mobile OS?

by nike black friday deals

When touring be certain to inform an individual of your travel schemes, in particular if you are departing and returning. This may be an additional safety within the dire but possible insurance coverage where one thing happens to you on youe excursion. Better to present oneself that additional security that a person is seeking out for you than sorry. nike black friday deals
 
VICIDIAL 'manager_send.php' CVE-2013-4467 SQL Injection Vulnerability
 
A 3D printing services company has demonstrated the ability to print a fully-functional .45 caliber, semi-automatic pistol.
 
Researchers have found a way for the first time to tune the radio frequency in smartphones and other wireless devices, promising reduced costs and higher performance for semiconductors used in defense, satellite and commercial communications.
 
The person who became known on the Internet for yelling at servers is now becoming famous for another, somewhat related, feat, creating a new type of data visualization for characterizing system performance.
 
 
The PCI Security Standards Council updated its security standard, adding new requirements and guidance for payment-card industry organizations, including merchants, payment processors, financial institutions and service providers.
 
LinuxSecurity.com: OpenSSH could be made to run programs if it received specially craftednetwork traffic from an authenticated user.
 
The percentage of passwords guessed after a given number of guesses (shown in log scale), by colleges within Carnegie Mellon University.

If you're a student or teacher in a computer science school of a big college, chances are good that you pick stronger passwords than your peers in the arts school. In turn, the arts students usually pick better passwords than those in the business school, according to research presented this week.

The landmark study is among the first to analyze the plaintext passwords that a sizable population of users choose to safeguard high-value accounts. The researchers examined the passwords of 25,000 faculty, staff, and students at Carnegie Mellon University used to access grades, e-mail, financial transcripts, and other sensitive data. The researchers then analyzed how guessable the passwords would be during an offline attack, such as those done after hackers break into a website and steal its database of cryptographically hashed login credentials. By subjecting the CMU passwords to a cracking algorithm with a complex password policy, the researchers found striking differences in the quality of the passwords chosen by various subgroups within the university population.

For instance, people associated with CMU's computer science and technology schools chose passwords that were more than 1.8 times stronger than those used by people in the business school. In between these two groups were people associated with the art school. Statistically speaking, passwords picked by computer science and technology users were only 68 percent as likely to be guessed as arts users and only 55 percent as likely to be cracked as people in the business school. Stated differently, the number of attempts required to successfully guess 100 arts school passwords in the typical offline crack would yield passwords for 124 people in the business school and 68 people in the computer science school.

Read 6 remaining paragraphs | Comments


    






 
Researchers at Duke University have created a device that collects stray energy from Wi-Fi and and other wireless signals and converts it into electricity that can charge as efficiently as solar cells.
 
Amazon dominates the cloud, but IBM, strengthened by its SoftLayer acquisition, has unleashed a marketing campaign that fires on all cylinders. Whether IBM's cloud is, in fact, better may matter less than Amazon's ability to challenge a company that's made many competitors crumble over the past 102 years.
 
Zikula Application Framework Unspecified Cross Site Scripting Vulnerability
 
Google on Thursday said that starting in January, only extensions offered through its own e-market can be installed on the Windows version of Chrome.
 
RE: FP BugCON 2014 - Mexico City
 
RETIRED: VideoCharge Studio '.vsc' File Handling Remote Buffer Overflow Vulnerability
 
Word 2003 SP2 .doc fork bomb on WinXP SP3
 
Apple MacOSX 10.9 Hard Link Memory Corruption
 
Government and industry need to overcome significant challenges, including those related to privacy and security, before commercial drone aircraft can be safely allowed over U.S. airspace, the FAA said Thursday.
 
Nvidia' Tegra 4i processor, the first of its chips with integrated support for LTE cellular data, is on course to appear in products early next year, CEO said Thursday.
 
Best known for its low-cost laptops, Acer doesn't really inspire thoughts of premium products. But building high-end hardware could be the Taiwanese vendor's best shot as it looks for a way to rescue its struggling business.
 
Government and industry need to overcome significant challenges, including those related to privacy and security, before commercial drone aircraft can be safely allowed over U.S. airspace, the FAA said Thursday.
 
Federal agencies aren't moving fast enough to consolidate government data centers, according to U.S. lawmakers. So they're pushing a bipartisan bill that sets "hard deadlines" to move the effort forward.
 
From audio gear to gadgets, smartphones to stocking stuffers, we've rounded up the best tech gear to give and get this year.
 
Ruby 'ruby-openid' CVE-2013-1812 Denial of Service Vulnerability
 
OpenSSH 'sshd' Process Remote Memory Corruption Vulnerability
 
Internet Storm Center Infocon Status