Blogs

BROWSE: Most Recent | Popular Tags |

Tags > security

Four short links: 15 April 2014

By Nat Torkington
April 15, 2014

Funders Punish Open Access Dodgers (Nature) — US’s NIH and UK’s Wellcome Trust are withholding funding from academics who haven’t released their data despite it being a condition of past funding. It’s open access’s grab twist and pull move. Digitize …

Security and the Internet of stuff in your life

By Jim Stogdill
April 10, 2014

Your computer is important. It has access to your Amazon account, probably your bank, your tax returns, and maybe even your medical records. It’s scary when it gets pwnd, and it gets pwned regularly because it’s essentially impossible to fully …

Four short links: 7 April 2014

By Nat Torkington
April 7, 2014

Can We Design Systems to Automate Ethics — code in self-driving cars will implement a solution to the trolley problem. But which solution? My First Post on Medium (Andy Baio) — one or two glitches but otherwise fine demonstration of …

Pursuing adoption of free and open source software in governments

By Andy Oram
March 25, 2014

Free and open source software creates a natural — and even necessary — fit with government. I joined a panel this past weekend at the Free Software Foundation conference LibrePlanet on this topic and have covered it previously in a …

Four short links: 20 March 2014

By Nat Torkington
March 20, 2014

Smart Interaction Lab — some interesting prototyping work designing for smart objects. Crypto 101 — self-directory crypto instruction. (via BoingBoing) Chipotle Culture — interesting piece on Chipotle’s approach to building positive feedback loops around training. Reminded me of Ben Horowitz’s …

New Web Security Course Teaches Web Application Protection from Hackers

By Michael de Libero
March 18, 2014

Become a More Secure Programmer by Learning How to Find and Fix Security Bugs It seems like every few months we hear about a new data breach where millions of credit card numbers or passwords get into the hands of the bad guys. Why does this happen so often? It isn’t because the bad guys …

The post New Web Security Course Teaches Web Application Protection from Hackers appeared first on O'Reilly School of Technology.

Four short links: 17 March 2014

By Nat Torkington
March 17, 2014

De-Design the Web — quiz, can you recognise common websites from just their wireframes? For the non-designer (like myself) it’s a potent reminder of the power of design. Design’s front of mind as we chew on the Internet of Affordances. …

Four short links: 11 March 2014

By Nat Torkington
March 11, 2014

In-Game Graph Analysis (The Economist) — one MLB team has bought a Cray Ulrika graph-processing appliance for in-game analysis of data. Please hold, boggling. (via Courtney Nash) Disney Bets $1B on Technology (BusinessWeek) — MyMagic+ promises far more radical change. …

Four short links: 10 March 2014

By Nat Torkington
March 10, 2014

Wolfram Language — a broad attempt to integrate types, operations, and databases along with deployment, parallelism, and real-time I/O. The demo video is impressive, not just in execution but in ambition. Healthy skepticism still necessary. Maury, Innovation, and Change (Cory …

Big data and privacy: an uneasy face-off for government to face

By Andy Oram
March 5, 2014

Thrust into controversy by Edward Snowden’s first revelations last year, President Obama belatedly welcomed a “conversation” about privacy. As cynical as you may feel about US spying, that conversation with the federal government has now begun. In particular, the first …

The technical aspects of privacy

By Andy Oram
March 5, 2014

Thrust into controversy by Edward Snowden’s first revelations last year, President Obama belatedly welcomed a “conversation” about privacy. As cynical as you may feel about US spying, that conversation with the federal government has now begun. In particular, the first …

Four short links: 5 March 2014

By Nat Torkington
March 5, 2014

$1 Gesture-Recognizing Device (GigaOm) — the AllSee is the size of a quarter, harvests RF for power, and detects the variations in signal strength caused by gestures. A Conversation with Sydney Brenner — The thing is to have no discipline …

Four short links: 4 March 2014

By Nat Torkington
March 4, 2014

It’s Complicated — Danah Boyd’s new book on teens use of the online world is available for PDF download (but buy a copy anyway!). Building a Solid World — O’Reilly research paper about the “software-enhanced networked physical world”. Gonna be …

Four short links: 27 February 2014

By Nat Torkington
February 27, 2014

Our Comrade, The Electron (Maciej Ceglowski) — a walk through the life of the inventor of the Theremin, with a pointed rant about how we came to build the surveillance state for the state. One of the best conference talks …

Four short links: 26 February 2014

By Nat Torkington
February 26, 2014

Librarybox 2.0 — fork of PirateBox for the TP-Link MR 3020, customized for educational, library, and other needs. Wifi hotspot with free and anonymous file sharing. v2 adds mesh networking and more. (via BoingBoing) Chicago PD’s Using Big Data to …

Four short links: 25 January 2014

By Nat Torkington
February 25, 2014

Bitcoin Markets Down — value of bitcoins plunges as market uncertain after largest bitcoin exchange goes insolvent after losing over 750k bitcoins because they didn’t update their software after a flaw was discovered in the signing of transactions. Flappy Bird …

Bitcoin is an open network that exhibits resilience and anti-fragility

By Andreas Antonopoulos
February 24, 2014

If a crook gets access to the credit card or wire transfer networks, it’s a disaster. That’s because, as I explained in my recent article about security models, these traditional financial networks achieve trust by excluding bad actors through access …

Bitcoin is an open network that exhibits resilience and anti-fragility

By Andreas Antonopoulos
February 24, 2014

If a crook gets access to the credit card or wire transfer networks, it’s a disaster. That’s because, as I explained in my recent article about security models, these traditional financial networks achieve trust by excluding bad actors through access …

Four short links: 24 February 2014

By Nat Torkington
February 24, 2014

Understanding Understanding Source Code with Functional Magnetic Resonance Imaging (PDF) — we observed 17 participants inside an fMRI scanner while they were comprehending short source-code snippets, which we contrasted with locating syntax error. We found a clear, distinct activation pattern …

Oobleck security

By Matthew Gast
February 21, 2014

I’ve been thinking (and writing) a lot lately about the intersection of hardware and software, and how standing at that crossroads does not fit neatly into our mental models of how to approach the world. Previously, there was hardware and …

The RSA/NSA controversy concerns you!

By Jeffrey Carr
February 18, 2014

As a cyber security author and CEO of a security consulting company, I was personally shocked by the RSA’s attitude about the alleged secret payments it received from the NSA as well as its willingness to weaken its BSAFE product; …

Four short links: 18 February 2014

By Nat Torkington
February 18, 2014

Offensive Computer Security — 2014 class notes, lectures, etc. from FSU. All CC-licensed. Twitter I Love You But You’re Bringing Me Down (Quinn Norton) — The net doesn’t make social problems. It amplifies them until they can’t be ignored. And …

Four short links: 13 February 2014

By Nat Torkington
February 13, 2014

The Common Crawl WWW Ranking — open data, open methodology, behind an open ranking of the top sites on the web. Preprint paper available. (via Slashdot) Felton’s Sensors (Quartz) — inside the gadgets Nicholas Felton uses to quantify himself. Myo …

Four short links: 10 February 2014

By Nat Torkington
February 10, 2014

Bruce Sterling at transmediale 2014 (YouTube) — “if it works, it’s already obsolete.” Sterling does a great job of capturing the current time: spies in your Internet, lost trust with the BigCos, the impermanence of status quo, the need to …

Four short links: 7 February 2014

By Nat Torkington
February 8, 2014

12 Predictions About the Future of Programming (Infoworld) — not a bad set of predictions, except for the inane “squeezing” view of open source. Conceal (Github) — Facebook Android tool for apps to encrypt data and large files stored in …

Four short links: 6 February 2014

By Nat Torkington
February 5, 2014

What Machines Can’t Do (NY Times) — In the 1950s, the bureaucracy was the computer. People were organized into technocratic systems in order to perform routinized information processing. But now the computer is the computer. The role of the human …

The Challenge of Health Data Security

By Julie Steele
February 5, 2014

Dr. Andrew Litt, Chief Medical Officer at Dell, made a thoughtful blog post last week about the trade-offs inherent in designing for both the security and accessibility of medical data, especially in an era of BYOD (bring your own device) …

Is watching network traffic obsolete?

By Rajat Bhargava
January 31, 2014

Being a part of the security industry for many years, we loved to watch all of the traffic coming and going from a network or even the servers. There was never enough data and as security folks we wanted to …

10 Steps to Help Your Users Secure Their Online Presence

By George Reese
January 30, 2014

10 steps that help online systems architects build authentication systems that empower their users to protect themselves against the multi-site attack strategies behind a number of recent high-profile attacks.

Four short links: 27 January 2014

By Nat Torkington
January 27, 2014

Druid — open source clustered data store (not key-value store) for real-time exploratory analytics on large datasets. It’s Time to Engineer Some Filter Failure (Jon Udell) — Our filters have become so successful that we fail to notice: We don’t …

Four short links: 24 January 2014

By Nat Torkington
January 24, 2014

What Every Computer Scientist Should Know About Floating Point Arithmetic — in short, “it will hurt you.” Ori — a distributed file system built for offline operation and empowers the user with control over synchronization operations and conflict resolution. We …

Safe(er) Passwords in PHP

By Chris Cornutt
January 22, 2014

As anyone whose used a web applications knows, the password is still the go-to form of identification. Sure, there have been lots of improvements in the world of identify over the last few years, but there’s still a constant flow …

Four short links: 22 January 2014

By Nat Torkington
January 22, 2014

How a Math Genius Hacked OkCupid to Find True Love (Wired) — if he doesn’t end up working for OK Cupid, productising this as a new service, something is wrong with the world. Humin: The App That Uses Context to …

Four short links: 20 January 2014

By Nat Torkington
January 20, 2014

idb (Github) — a tool to simplify some common tasks for iOS pentesting and research: screenshots, logs, plists/databases/caches, app binary decryption/download, etc. (via ShmooCon) Twitter Infrastructure — an interview with Raffi Krikorian, VP of Platform Engineering. Details on SOA, deployment …

Four short links: 15 January 2014

By Nat Torkington
January 15, 2014

Hackers Gain ‘Full Control’ of Critical SCADA Systems (IT News) — The vulnerabilities were discovered by Russian researchers who over the last year probed popular and high-end ICS and supervisory control and data acquisition (SCADA) systems used to control everything …

Four short links: 14 January 2014

By Nat Torkington
January 13, 2014

LayoutIt — drag-and-drop design using Bootstrap components. These tools are proliferating, as the standard design frameworks like Bootstrap make them possible. There’s unsustainable complexity in building web sites today, which means something will give: the web will lose to something, …

Is the Jump Box Obsolete?

By Andy Oram
January 10, 2014

With compliance becoming an ever-increasing priority and hybrid infrastructures becoming the norm, many traditional IT practices must evolve or die. Perhaps a widely used practice that hasn’t kept up with the evolution of compliance requirements in increasingly hybrid environments is …

Four short links: 10 January 2014

By Nat Torkington
January 10, 2014

Software in 2014 (Tim Bray) — a good state of the world, much of which I agree with. Client-side: Things are bad. You have to build everything three times: Web, iOS, Android. We’re talent-starved, this is egregious waste, and it’s …

How did we end up with a centralized Internet for the NSA to mine?

By Andy Oram
January 8, 2014

I’m sure it was a Wired editor, and not the author Steven Levy, who assigned the title “How the NSA Almost Killed the Internet” to yesterday’s fine article about the pressures on large social networking sites. Whoever chose the title, …

Four short links: 8 January 2014

By Nat Torkington
January 8, 2014

Launching the Wolfram Connected Devices Project — Wolfram Alpha is cognition-as-a-service, which they hope to embed in devices. This data-powered Brain-in-the-Cloud play will pit them against Google, but G wants to own the devices and the apps and the eyeballs …

Four short links: 7 January 2014

By Nat Torkington
January 7, 2014

Pebble Gets App Store (ReadWrite Web) — as both Pebble and MetaWatch go after the high-end watch market. Wearables becoming more than a nerd novelty. Thinking About the Network as Filter (JP Rangaswami) — Constant re-openings of the same debate …

Security firms must retool as clients move to the cloud

By Andy Oram
January 6, 2014

This should be flush times for firms selling security solutions, such as Symantec, McAfee, Trend Micro, and RSA. Front-page news about cyber attacks provides free advertising, and security capabilities swell with new techniques such as security analysis (permit me a …

Four short links: 30 December 2013

By Nat Torkington
December 30, 2013

tooldiag — a collection of methods for statistical pattern recognition. Implemented in C. Hacking MicroSD Cards (Bunnie Huang) — In my explorations of the electronics markets in China, I’ve seen shop keepers burning firmware on cards that “expand” the capacity …

Four short links: 23 December 2013

By Nat Torkington
December 23, 2013

DelFly Explorer — 20 grams, 9 minutes of autonomous flight, via barometer and new stereo vision system. (via Wayne Radinsky) Banning Autonomous Killing Machines (Tech Republic) — While no autonomous weapons have been built yet, it’s not a theoretical concern, …

Four short links: 19 December 2013

By Nat Torkington
December 19, 2013

RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis (PDF) — research uses audio from CPU to break GnuPG’s implementation of RSA. The attack can extract full 4096-bit RSA decryption keys from laptop computers (of various models), within an hour, using the …

Preventing Problems in PHP Security

By Chris Cornutt
December 19, 2013

As any PHP developer that’s been around for a while will tell you, there’s a certain kind of stigma that comes with the language. They’ll hear it from their peers using other languages that PHP is “sloppy” or that “it’s …

Four short links: 18 December 2013

By Nat Torkington
December 18, 2013

Cyberpunk 2013 — a roleplaying game shows a Gibsonian view of 2013 from 1988. (via Ben Hammersley) The Future Computer Utility — 1967 prediction of the current state. There are several reasons why some form of regulation may be required. …

Four short links: 4 December 2013

By Nat Torkington
December 4, 2013

Skyjack — drone that takes over other drones. Welcome to the Malware of Things. Bootstrap World — a curricular module for students ages 12-16, which teaches algebraic and geometric concepts through computer programming. (via Esther Wojicki) Harvest — open source …

Four short links: 20 November 2013

By Nat Torkington
November 20, 2013

Innovation and the Coming Shape of Social Transformation (Techonomy) — great interview with Tim O’Reilly and Max Levchin. in electronics and in our devices, we’re getting more and more a sense of how to fix things, where they break. And …

Four short links: 13 November 2013

By Nat Torkington
November 12, 2013

ISS Enjoys Malware — Kaspersky reveals ISS had XP malware infestation before they shifted to Linux. The Gravity movie would have had more registry editing sessions if the producers had cared about FACTUAL ACCURACY. Big Data Approach to Computational Creativity …


1 to 50 of 463 Next
The Watering Hole