10 AWS security blunders and how to avoid them
The cloud has made it dead simple to quickly spin up a new server without waiting for IT. But the ease of deploying new servers -- and the democratic nature of cloud management -- can be a security...
View ArticleThe 7 most vexing problems in programming
It’s been said that the uncharted territories of the old maps were often marked with the ominous warning: “Here be dragons.” Perhaps apocryphal, the idea was that no one wandering into these unknown...
View Article10 things you need to worry about in 2017
Each year, including last year, I’ve supplied you with “areas of concern”—that is, stuff that might not go well for you or our comrades in the coming 12 months. I’m happy to oblige once again this...
View Article90% off Become an Ethical Hacker With This Complete eLearning Bundle - Deal...
With cyberattacks putting everyone on edge, companies are looking for ethical hackers--IT pros paid handsomely to hack their network, expose security flaws, and fix them before someone else breaks in....
View Article5 core topics Trump needs to address in Silicon Valley leaders meeting
As some of the tech sector’s heaviest hitters prep for a meeting this week with president-elect Donald Trump, they need to make sure they get answers to critical questions about issues that could...
View Article49% off CyberPower Surge Protector 3-AC Outlet with 2 USB (2.1A) Charging...
The Professional Surge Protector CSP300WUR1 safeguards common home and office devices, such as computers and electronics, by absorbing spikes in energy caused by storms and electrical power surges....
View ArticleGoogle open-sources test suite to find crypto bugs
Working with cryptographic libraries is hard, and a single implementation mistake can result in serious security problems. To help developers check their code for implementation errors and find...
View Article5 signs we're finally getting our act together on security
The high-water line in information security gets higher each year. Just as we think we’ve finally figured out how to defend against attacks, then attackers come up with something new and we are right...
View ArticleData breaches through wearables put target squarely on IoT in 2017
Forrester predicts that more than 500,000 internet of things (IoT) devices will suffer a compromise in 2017, dwarfing Heartbleed. Drop the mic — enough said.With the sheer velocity of how the...
View ArticleExposed MongoDB installs being erased, held for ransom
Security researcher Victor Gevers, co-founder of the GDI Foundation, a non-profit dedicated to making the internet safer, is urging administrators to check their MongoDB installations, after finding...
View ArticleGit Hound, Truffle Hog root out GitHub leaks
It's App Dev 101: Don't hard-code API tokens, encryption keys, and user credentials. But if you do, make sure to get them out of your code before committing to GitHub or other public code...
View ArticleGet 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal...
NordVPN gives you a private and fast path through the public Internet. All of your data is protected every step of the way using revolutionary 2048-bit SSL encryption even a supercomputer can’t crack....
View Article43% off Microsoft Wireless Desktop 900 Keyboard and Mouse Bundle - Deal Alert
The Wireless Desktop 900 keyboard from Microsoft has quiet-touch keys and customizable buttons for access to the Windows features you use most. The full-size ambidextrous mouse provides comfortable,...
View ArticleOracle to Java devs: Stop signing JAR files with MD5
Starting in April, Oracle will treat JAR files signed with the MD5 hashing algorithm as if they were unsigned, which means modern releases of the Java Runtime Environment (JRE) will block those JAR...
View ArticleAttackers start wiping data from CouchDB and Hadoop databases
It was only a matter of time until ransomware groups that wiped data from thousands of MongoDB databases and Elasticsearch clusters started targeting other data storage technologies. Researchers are...
View ArticleResearchers propose a way to use your heartbeat as a password
Researchers at Binghamton State University in New York think your heart could be the key to your personal data. By measuring the electrical activity of the heart, researchers say they can encrypt...
View Article41% off Netgear Arlo Security System Wireless HD Camera, Indoor/Outdoor,...
The Arlo camera is a 100 Percent Wire-Free, completely wireless, HD smart home security camera – so you can get exactly the shot you need – inside or out. The Arlo camera is weatherproof and includes...
View ArticleInfoWorld's 2017 Technology of the Year Award winners
2017 Technology of the Year AwardsImage by Jane Van GinkelDid you notice that Google is giving away its magic sauce? Google engineers used to merely write papers about their creations, then leave it to...
View ArticleGitLab database goes out after spam attack
Code-hosting site GitLab has suffered an outage after sustaining a "serious" incident on Tuesday with one of its databases that has required emergency maintenance. The company today said it lost six...
View ArticleOpen source users: It’s time for extreme vetting
Open source software is the norm these days rather than the exception. The code is being written in high volumes and turning up in critical applications. While having this code available can offer big...
View Article