Remove Authentication Remove Hardware Remove Linux Remove Security
article thumbnail

Technology Short Take 176

Scott Lowe

This Tech Short Take is a bit heavy on security-related links, but there’s still some additional content in a number of other areas, so you should be able to find something useful—or at least interesting—in here. Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Think Linux doesn’t have malware?

Linux 112
article thumbnail

Yubico’s new USB-C security key with NFC could be the one key to unlock them all

The Verge

Yubico is announcing a new version of its USB-C equipped YubiKey 5 security key with NFC built in, which should theoretically be a convenient combo and compatible with many future devices moving forward. Hardware-based keys offer extra layer of account security. Image: Yubico.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Microsoft Pluton is a new processor with Xbox-like security for Windows PCs

The Verge

Microsoft is creating a new security chip that’s designed to protect future Windows PCs. Microsoft Pluton is a security processor that is built directly into future CPUs and will replace the existing Trusted Platform Module (TPM), a chip that’s currently used to secure hardware and cryptographic keys. so you just get it.”

Windows 141
article thumbnail

Wireless Security | Roadmap to Securing Your Infrastructure

Linux Academy

Wireless security is not only a huge subject, but it’s also extremely important. It was patched quickly but this raised wireless security questions about WPA2. This is a great example of being proactive in security. An attempt to help secure open wireless networks with Opportunistic Wireless Encryption (OWE).

article thumbnail

How to Get Started with Mayhem

ForAllSecure

Mayhem also handles user-land (containerized) Linux applications. Here are some helpful tips for quickly determining if your application is compatible: Does the Linux file <app> command say that your application is a Linux ELF file? Development Speed or Code Security. Is the application a user-land application?

How To 40
article thumbnail

Technology Short Take 141

Scott Lowe

The collection of links shared below covers a fairly wide range of topics, from old Sun hardware to working with serverless frameworks in the public cloud. Via Ivan Pepelnjak, I was pointed to Jon Langemak’s in-depth discussion of working with Linux VRFs. Servers/Hardware. I hope that you find something useful here.

Vmware 60
article thumbnail

Technology Short Take 136

Scott Lowe

The content this time around seems to be a bit more security-focused, but I’ve still managed to include a few links in other areas. Rory McCune points out that Kubernetes is a router , and users should not rely on the fact that pods are not accessible from the outside by default as any form of a security barrier. Networking.

Linux 60