Key trends in software infrastructure in 2019: observability, chaos, and cloud complexity
Software infrastructure has, over the last decade or so, become a key concern for developers of all stripes. Long gone are narrowly defined job...
How cybersecurity can help us secure cyberspace
With cybercrime on the rise, companies have started adopting the hard ways of preventing system breaches. Cybersecurity has become the need of the hour....
Malicious code in npm ‘event-stream’ package targets a bitcoin wallet and causes 8 million...
Last week Ayrton Sparling, a Computer Science major at CSUF, California disclosed that the popular npm package, event-stream, contains a malicious package named flatmap-stream. He disclosed the issue...
How to stop hackers from messing with your home network (IoT)
This week, NCCIC, in collaboration with cybersecurity authorities of Australia, Canada, New Zealand, the United Kingdom, and the United States released a joint ‘Activity...
Fake Python libraries removed from PyPi when caught stealing SSH and GPG keys, reports...
Yesterday, ZDNet reported that the Python security team removed two fake Python libraries from PyPI (Python Package Index). These libraries were caught stealing SSH...
Researchers reveal vulnerability that can bypass payment limits in contactless Visa card
A few days ago, researchers from Positive technologies discovered flaws in Visa contactless cards, which allow hackers to bypass the payment limits. This research...
Virality of fake news on social media: Are weaponized AI bots to blame, questions...
A lot of fake news has been spreading in recent times via social media channels such as Facebook, Twitter, Whatsapp, and so on. A...
Why scepticism is important in computer security: Watch James Mickens at USENIX 2018 argue...
"Technology, in general, and computer science in particular, have been hyped up to such an extreme level that we've ignored the importance of not...
FreeRTOS affected by 13 vulnerabilities in its TCP/IP stack
FreeRTOS, a popular real-time operating system kernel for embedded devices, is found to have 13 vulnerabilities, as reported by Bleeping Computers yesterday. A part...
Australia’s Assistance and Access (A&A) bill, popularly known as the anti-encryption law, opposed by...
Last week, Australia’s Assistance and Access (A&A) anti-encryption law was passed through Parliament, which allows Australian police and government the powers to issue technical...