Security Leftovers and Lots of Self-Serving FUD Pieces
-
Cities' emergency sirens will play anything you send them over an unencrypted radio protocol
Seeber used a software-defined radio to monitor possible transmissions to the PA speakers. He struggled to identify the control messages, and had given up, but then, after the Dallas hack, he renewed his interest. Close examination of a photo of one of the speakers revealed its yagi antenna, from which he was able to derive the control frequencies; with this information, he was able to reverse-engineer the protocol used to send messages to the PAs for broadcast.
The protocols contain no authentication or encryption, meaning that anyone can make any or all of the towers broadcast any audio-file at earsplitting, terrifying volume.
[...]
ATI claims that the research that revealed the defects in their products is illegal, and that discussing these defects is also illegal, [...]
-
'Cloud' over Microsoft accreditation for top tier of govt service
The Protected status, which was publicised by Microsoft on 3 April, means it can now handle government data with the highest security clearance.
Microsoft became the fifth provider to be certified to offer such services, with the others being Dimension Data, Vault Systems, Sliced Tech and Macquarie Government.
-
Security updates for Thursday
-
1.5 Billion Sensitive Files Remain Exposed On Open Internet, Researchers Say
Researchers have found out approximately 1.5 billion files of sensitive nature such as medical scans, payment bills, and patent applications remain exposed on the open internet.
-
1.5 bn sensitive documents on open internet: researchers [Ed: Self-promotional stunts painted as "research" have become common. Some are connected to Microsoft, especially when it's FUD about FOSS.]
-
WhiteSource Expands Its Open Source Security Solution for Containerized Applications with Continuous Image Scanning [Ed: WhiteSource is still connected to Microsoft in more than one way]
-
New Research from CAST Exposes Risk in Open Source Software [Ed: Another opportunist seeing money in attacking FOSS while not mentioning back doors in proprietary software]
-
Developers Failing to Use Secure Open Source Components [Ed: Another firm striving to attract business by publicly attacking FOSS and intentionally ignoring risks of proprietary software]
-
Capsule8 introduces Linux workload attack detection platform
Capsule8 announced the general availability of Capsule8 1.0, a real-time, zero-day attack detection platform capable of scaling to massive production deployments.
- Login or register to post comments
- Printer-friendly version
- 2283 reads
- PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
digiKam 7.7.0 is releasedAfter three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. |
Dilution and Misuse of the "Linux" Brand
|
Samsung, Red Hat to Work on Linux Drivers for Future TechThe metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. |
today's howtos
|
Recent comments
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago