https://arstechnica.com/information-technology/2018/07/rash-of-fortnite-cheaters-infected-by-malware-that-breaks-https-encryption/
Even if we are talking about a game, a malware such this can be very risky.
Tags: #security #malware
Even if we are talking about a game, a malware such this can be very risky.
Tags: #security #malware
Ars Technica
Rash of Fortnite cheaters infected by malware that breaks HTTPS encryption
Malware can read, intercept, or tamper with the traffic of any HTTPS-protected site.
https://nakedsecurity.sophos.com/2018/06/28/windows-10-security-can-be-bypassed-by-settings-page-weakness/
Perhaps Microsoft won't ever fix this because "it's not a bug, it's a feature". Through this, you can execute cmd and Powershell commands.
Tags: #windows #security
Perhaps Microsoft won't ever fix this because "it's not a bug, it's a feature". Through this, you can execute cmd and Powershell commands.
Tags: #windows #security
Naked Security
Windows 10 security can be bypassed by Settings page weakness
The file type used by Windows 10’s settings page can be used to trick Windows into running files it’s supposed to block.
https://techcrunch.com/2018/07/08/serverless-computing-could-unleash-a-new-startup-ecosystem
Tags: #technology
Tags: #technology
TechCrunch
Serverless computing could unleash a new startup ecosystem
While serverless computing isn’t new, it has reached an interesting place in its development. As developers begin to see the value of serverless architecture, a whole new startup ecosystem could begin to develop around it. Serverless isn’t exactly serverless…
https://techcrunch.com/2018/07/19/how-facebook-configures-its-millions-of-servers-every-day
Tags: #technology #performance #facebook
Tags: #technology #performance #facebook
TechCrunch
How Facebook configures its millions of servers every day
When you’re a company the size of Facebook with more than two billion users on millions of servers, running thousands of configuration changes every day involving trillions of configuration checks, as you can imagine, configuration is kind of a big deal.…
https://thehackernews.com/2018/07/powershell-core-linux-snap.html
Now we can see the effects of the partnership of Microsoft with Canonical.
Tags: #linux #microsoft #development #tools
Now we can see the effects of the partnership of Microsoft with Canonical.
Tags: #linux #microsoft #development #tools
https://mynameismjp.wordpress.com/2018/07/03/breaking-down-barriers-part-4-gpu-preemption/
Tags: #programming
Tags: #programming
The Danger Zone
Breaking Down Barriers – Part 4: GPU Preemption
You can find an ad-free static site version of this post here: This is Part 4 of a series about GPU synchronization and preemption. You can find the other articles here: Part 1 – What’s…
https://protonmail.com/blog/openpgpjs-protonmail-security-audit/
Tags: #security #encryption #javascript
Tags: #security #encryption #javascript
ProtonMail Blog
ProtonMail’s open source encryption library security audit - ProtonMail Blog
We maintain the OpenPGPjs encryption library. After some recent code enhancements, OpenPGPjs underwent an independent security audit, the results of which are discussed in this article.
https://monoinfinito.wordpress.com/series/introduction-to-c-template-metaprogramming/
Tags: #programming #cpp
Tags: #programming #cpp
An infinite monkey - Nico Brailovsky's blog
C++ template metaprogramming introduction
Disclaimer: After so many years (and blog migrations), this article might be broken or outdated. Yeah, blog migrations, that’s it. Anything that’s wrong is the fault of a blog migration…
Over one year ago we introduced a subscription feature in our bot to let you receive posts about the topics you are interested into the most. Are you using it or do you not find it interesting?
anonymous poll
🤪 Didn't know you had a bot – 85
👍👍👍👍👍👍👍 69%
🤔 Didn't know you had such feature – 26
👍👍 21%
👎 Not using it and not interested – 8
👍 6%
👍 Yes, using and interested – 3
▫️ 2%
❤️ I love it – 2
▫️ 2%
👥 124 people voted so far.
anonymous poll
🤪 Didn't know you had a bot – 85
👍👍👍👍👍👍👍 69%
🤔 Didn't know you had such feature – 26
👍👍 21%
👎 Not using it and not interested – 8
👍 6%
👍 Yes, using and interested – 3
▫️ 2%
❤️ I love it – 2
▫️ 2%
👥 124 people voted so far.
https://latesthackingnews.com/2018/09/30/mojave-flaws-allow-an-attacker-to-bypass-full-disk-access-requirement/
Tags: #security #macos
Tags: #security #macos
Latest Hacking News
Mojave Flaws Allow An Attacker To Bypass Full Disk Access Requirement
Right after the launch of the latest MacOS Mojave, researchers have begun discovering various security vulnerabilities. Amidst the claims of releasing a specific protective OS for the users, such bugs raise concerns about the security features. Recently,…