https://arstechnica.com/information-technology/2018/06/simple-technique-bypassed-macos-signature-checks-by-third-party-tools/
Tags: #macos #security
  
  Tags: #macos #security
Ars Technica
  
  For almost 11 years, hackers could easily bypass 3rd-party macOS signature checks
  Technique caused security apps to falsely show untrusted apps were signed by Apple.
  https://arxiv.org/pdf/1806.05179.pdf
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation
A research that aims to a structural redesign of CPUs to solve Spectre and Meltdown flaws.
Tags: #security #hardware #cpu
  SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation
A research that aims to a structural redesign of CPUs to solve Spectre and Meltdown flaws.
Tags: #security #hardware #cpu
https://vane.pl/content/images/tmp/ios-at-facebook.pdf
An interesting presentation with transcription about how things work in Facebook and the reason behind the heaviness of Facebook for iOS (which binary is now over 350MBs of weight)
Tags: #facebook #ios #it
  
  
  
  
  
  An interesting presentation with transcription about how things work in Facebook and the reason behind the heaviness of Facebook for iOS (which binary is now over 350MBs of weight)
Tags: #facebook #ios #it
https://www.wi-fi.org/news-events/newsroom/wi-fi-alliance-introduces-wi-fi-certified-wpa3-security
WPA3 specification for network authentication is now official. This is the official announcement.
Tags: #networking #security
  WPA3 specification for network authentication is now official. This is the official announcement.
Tags: #networking #security
https://arstechnica.com/information-technology/2018/07/rash-of-fortnite-cheaters-infected-by-malware-that-breaks-https-encryption/
Even if we are talking about a game, a malware such this can be very risky.
Tags: #security #malware
  
  Even if we are talking about a game, a malware such this can be very risky.
Tags: #security #malware
Ars Technica
  
  Rash of Fortnite cheaters infected by malware that breaks HTTPS encryption
  Malware can read, intercept, or tamper with the traffic of any HTTPS-protected site.
  https://nakedsecurity.sophos.com/2018/06/28/windows-10-security-can-be-bypassed-by-settings-page-weakness/
Perhaps Microsoft won't ever fix this because "it's not a bug, it's a feature". Through this, you can execute cmd and Powershell commands.
Tags: #windows #security
  
  Perhaps Microsoft won't ever fix this because "it's not a bug, it's a feature". Through this, you can execute cmd and Powershell commands.
Tags: #windows #security
Naked Security
  
  Windows 10 security can be bypassed by Settings page weakness
  The file type used by Windows 10’s settings page can be used to trick Windows into running files it’s supposed to block.
  https://techcrunch.com/2018/07/08/serverless-computing-could-unleash-a-new-startup-ecosystem
Tags: #technology
  
  Tags: #technology
TechCrunch
  
  Serverless computing could unleash a new startup ecosystem
  While serverless computing isn’t new, it has reached an interesting place in its development. As developers begin to see the value of serverless architecture, a whole new startup ecosystem could begin to develop around it. Serverless isn’t exactly serverless…
  https://techcrunch.com/2018/07/19/how-facebook-configures-its-millions-of-servers-every-day
Tags: #technology #performance #facebook
  
  Tags: #technology #performance #facebook
TechCrunch
  
  How Facebook configures its millions of servers every day
  When you’re a company the size of Facebook with more than two billion users on millions of servers, running thousands of configuration changes every day involving trillions of configuration checks, as you can imagine, configuration is kind of a big deal.…
  https://thehackernews.com/2018/07/powershell-core-linux-snap.html
Now we can see the effects of the partnership of Microsoft with Canonical.
Tags: #linux #microsoft #development #tools
  Now we can see the effects of the partnership of Microsoft with Canonical.
Tags: #linux #microsoft #development #tools
https://mynameismjp.wordpress.com/2018/07/03/breaking-down-barriers-part-4-gpu-preemption/
Tags: #programming
  
  Tags: #programming
The Danger Zone
  
  Breaking Down Barriers – Part 4: GPU Preemption
  You can find an ad-free static site version of this post here: This is Part 4 of a series about GPU synchronization and preemption. You can find the other articles here: Part 1 – What’s…
  https://protonmail.com/blog/openpgpjs-protonmail-security-audit/
Tags: #security #encryption #javascript
  
  Tags: #security #encryption #javascript
ProtonMail Blog
  
  ProtonMail’s open source encryption library security audit - ProtonMail Blog
  We maintain the OpenPGPjs encryption library. After some recent code enhancements, OpenPGPjs underwent an independent security audit, the results of which are discussed in this article.
  https://monoinfinito.wordpress.com/series/introduction-to-c-template-metaprogramming/
Tags: #programming #cpp
  
  Tags: #programming #cpp
An infinite monkey - Nico Brailovsky's blog
  
  C++ template metaprogramming introduction
  Disclaimer: After so many years (and blog migrations), this article might be broken or outdated. Yeah, blog migrations, that’s it. Anything that’s wrong is the fault of a blog migration…