The OPNFV Project, an open source project that facilitates the development and evolution of Network Functions Virtualization (NFV) components across various open source ecosystems through collaborative upstream development, integration, deployment, and testing, today announced the initial session agenda for its third-annual OPNFV Summit. Hosted by LF Asia, LLC, the Summit takes place June 12-15 in Beijing, and brings together key developers, communities, and organizations within the networking industry.
I was recently invited to take part in some research by BBC Click, alongside Professor Alan Woodward, to analyse a device that had quite a lot of people all excited. With slick marketing, catchy tag lines and some pretty bold claims about their security, nomx claim to have cracked email security once and for all. Down the rabbit hole we go!
To understand why it is so difficult to defend computers from even moderately capable hackers, consider the case of the security flaw officially known as CVE-2017-0199.
The bug was unusually dangerous but of a common genre: it was in Microsoft software, could allow a hacker to seize control of a personal computer with little trace, and was fixed April 11 in Microsoft's regular monthly security update.
German researchers have published a paper finding that developers do indeed copy and paste code directly into their open source software, which can lead to the introduction of security vulnerabilities if that code comes from flawed online tutorials.
Qt developers have begun a fresh round of discussions over the supported platforms / operating systems of Qt 5.10 that will be released in the later part of this calendar years.
Among the officially supported Linux distribution changes would be moving to RHEL 7.3, openSUSE Leap 42.2, Ubuntu 17.04 (still keeping around 16.04 LTS too), moving the Windows MinGW to MinGW 6.3, and more.
digiKam is an advanced cross-platform digital photo management app inspired by photographers’ needs to view, tweak, enhance, organize, and share photographs across Linux systems.
It possesses all the tools and feature set necessary to process, manage, organize, and transfer photographs, videos, and RAW files – while consistently receiving optimization upgrades to its feature set and workflow.
A more accessible way to enable low graphics mode on Unity 7 may be on the way.
The desktop already supports a low graphics mode of sorts, which can be enabled via Compiz.
But this is far a) not easy to enable and b) does not disable every cycle-sucking composited element in the UI.
Bits from the Debian Release Team: release update
We're approaching the final sprint towards Debian 9 "stretch".
If you're still planning a BSP for stretch, now is the time to get it
Tor 0.3.0.6 is released: a new series is stable!
Tor 0.3.0.6 is the first stable release of the Tor 0.3.0 series.
With the 0.3.0 series, clients and relays now use Ed25519 keys to authenticate their link connections to relays, rather than the old RSA1024 keys that they used before. (Circuit crypto has been Curve25519-authenticated since 0.2.4.8-alpha.) We have also replaced the guard selection and replacement algorithm to behave more robustly in the presence of unreliable networks, and to resist guard- capture attacks.
Easy ways to make your Android device more secure
How secure is your data on that Android smartphone? On a scale of "Alcatraz" to "open field of flowers," where does yours rank? If you're truly concerned about the security of your mobile device (which you should be), you know there are always steps to take to further clamp it down. Because some of these steps a bit more complicated, they are often overlooked by the average user. That's why I want to offer up a few easy ways anyone can bring a bit more security to their Android device.