https://arstechnica.com/information-technology/2018/06/simple-technique-bypassed-macos-signature-checks-by-third-party-tools/
Tags: #macos #security
Tags: #macos #security
Ars Technica
For almost 11 years, hackers could easily bypass 3rd-party macOS signature checks
Technique caused security apps to falsely show untrusted apps were signed by Apple.
https://arxiv.org/pdf/1806.05179.pdf
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation
A research that aims to a structural redesign of CPUs to solve Spectre and Meltdown flaws.
Tags: #security #hardware #cpu
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation
A research that aims to a structural redesign of CPUs to solve Spectre and Meltdown flaws.
Tags: #security #hardware #cpu
https://vane.pl/content/images/tmp/ios-at-facebook.pdf
An interesting presentation with transcription about how things work in Facebook and the reason behind the heaviness of Facebook for iOS (which binary is now over 350MBs of weight)
Tags: #facebook #ios #it
An interesting presentation with transcription about how things work in Facebook and the reason behind the heaviness of Facebook for iOS (which binary is now over 350MBs of weight)
Tags: #facebook #ios #it
https://www.wi-fi.org/news-events/newsroom/wi-fi-alliance-introduces-wi-fi-certified-wpa3-security
WPA3 specification for network authentication is now official. This is the official announcement.
Tags: #networking #security
WPA3 specification for network authentication is now official. This is the official announcement.
Tags: #networking #security
https://arstechnica.com/information-technology/2018/07/rash-of-fortnite-cheaters-infected-by-malware-that-breaks-https-encryption/
Even if we are talking about a game, a malware such this can be very risky.
Tags: #security #malware
Even if we are talking about a game, a malware such this can be very risky.
Tags: #security #malware
Ars Technica
Rash of Fortnite cheaters infected by malware that breaks HTTPS encryption
Malware can read, intercept, or tamper with the traffic of any HTTPS-protected site.
https://nakedsecurity.sophos.com/2018/06/28/windows-10-security-can-be-bypassed-by-settings-page-weakness/
Perhaps Microsoft won't ever fix this because "it's not a bug, it's a feature". Through this, you can execute cmd and Powershell commands.
Tags: #windows #security
Perhaps Microsoft won't ever fix this because "it's not a bug, it's a feature". Through this, you can execute cmd and Powershell commands.
Tags: #windows #security
Naked Security
Windows 10 security can be bypassed by Settings page weakness
The file type used by Windows 10’s settings page can be used to trick Windows into running files it’s supposed to block.
https://techcrunch.com/2018/07/08/serverless-computing-could-unleash-a-new-startup-ecosystem
Tags: #technology
Tags: #technology
TechCrunch
Serverless computing could unleash a new startup ecosystem
While serverless computing isn’t new, it has reached an interesting place in its development. As developers begin to see the value of serverless architecture, a whole new startup ecosystem could begin to develop around it. Serverless isn’t exactly serverless…
https://techcrunch.com/2018/07/19/how-facebook-configures-its-millions-of-servers-every-day
Tags: #technology #performance #facebook
Tags: #technology #performance #facebook
TechCrunch
How Facebook configures its millions of servers every day
When you’re a company the size of Facebook with more than two billion users on millions of servers, running thousands of configuration changes every day involving trillions of configuration checks, as you can imagine, configuration is kind of a big deal.…
https://thehackernews.com/2018/07/powershell-core-linux-snap.html
Now we can see the effects of the partnership of Microsoft with Canonical.
Tags: #linux #microsoft #development #tools
Now we can see the effects of the partnership of Microsoft with Canonical.
Tags: #linux #microsoft #development #tools
https://mynameismjp.wordpress.com/2018/07/03/breaking-down-barriers-part-4-gpu-preemption/
Tags: #programming
Tags: #programming
The Danger Zone
Breaking Down Barriers – Part 4: GPU Preemption
You can find an ad-free static site version of this post here: This is Part 4 of a series about GPU synchronization and preemption. You can find the other articles here: Part 1 – What’s…
https://protonmail.com/blog/openpgpjs-protonmail-security-audit/
Tags: #security #encryption #javascript
Tags: #security #encryption #javascript
ProtonMail Blog
ProtonMail’s open source encryption library security audit - ProtonMail Blog
We maintain the OpenPGPjs encryption library. After some recent code enhancements, OpenPGPjs underwent an independent security audit, the results of which are discussed in this article.
https://monoinfinito.wordpress.com/series/introduction-to-c-template-metaprogramming/
Tags: #programming #cpp
Tags: #programming #cpp
An infinite monkey - Nico Brailovsky's blog
C++ template metaprogramming introduction
Disclaimer: After so many years (and blog migrations), this article might be broken or outdated. Yeah, blog migrations, that’s it. Anything that’s wrong is the fault of a blog migration…