article thumbnail

‘Extremely bad’ vulnerability found in widely used logging system

The Verge

The vulnerability is found in log4j, an open-source logging library used by apps and services across the internet. A blog post from application security company LunaSec claimed that gaming platform Steam and Apple’s iCloud had already been found to be vulnerable.

System 142
article thumbnail

Technology Short Take 136

Scott Lowe

This article by Joshua Fox outlines how and when to use each of the various types of firewalls offered by AWS. The popular open source cryptography library known as Bouncy Castle has uncovered a severe authentication bypass vulnerability. Linux may be coming to the Apple M1 chip. Compute safely.

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FBI Warns of ‘More Destructive’ DDoS Attacks

SecureWorld News

In February 2020, UK security researchers discovered a vulnerability in free, open source, automation servers that would allow cybercriminals to amplify a Distributed Denial of Service attack by 100. Configure network firewalls to block unauthorized IP addresses and disable port forwarding.

Network 53
article thumbnail

Data Security and its Importance on the Internet

Galido

Hacking and data breaches are a common thing today, especially with the rise of open source platforms and electronic transactions. Enable a firewall and a comprehensive malware removal program like Malwarebytes to detect and keep all types of malware away. Turn on your firewall. Set them to update regularly.

article thumbnail

Technology Short Take #63

Scott Lowe

Matt Oswalt recently unveiled (and open sourced) a framework called ToDD, which stands for “Testing on Demand: Distributed”. Russell Pope at Kovarus recently wrote about using security groups to manage the VMware NSX distributed firewall. Read more about it here. Servers/Hardware. Sorry, I don’t have anything for you this time.

Vmware 60
article thumbnail

All You Need to Know About VMI for Mobile Apps

Galido

They use various methods to host the virtual mobile applications and their data, but in most cases almost every bit of it exists safely beyond the firewall. Apple introduces licensing limitations. For Virtual Mobile Infrastructure, Android is the best operating system due to its large customer base and open source feature.

Mobile 81
article thumbnail

Technology Short Take 132

Scott Lowe

I think a fair number of folks may not be aware that the Nginx ingress controller for Kubernetes—both the community version and the Nginx-maintained open source version—do suffer from timeouts and errors resulting from changes in the back-end application’s list of endpoints (think pods being added or removed).