Remove Authentication Remove Journal Remove Open Source Remove Virtualization
article thumbnail

Technology Short Take 176

Scott Lowe

The vulnerability affects virtually all Linux distributions and allows attackers to bypass the secure boot protections and insert a low-level bootkit. This would be why I hate it when companies force me to use SMS for two-factor authentication—at least let me use a one-time passcode or something.

Linux 112
article thumbnail

HackerOne CEO Mårten Mickos: COVID-19 is ‘the planet’s warning’ to accelerate digital civilization

GeekWire

MÃ¥rten Mickos speaks with GeekWire via video chat in advance of his keynote this Thursday May 14 at the third annual Nordic Innovation Summit, a free virtual event this year. A native of Finland, he’s the former CEO of MySQL, the open-source database company that was sold to Sun Microsystems in 2008.

article thumbnail

Technology Short Take 116

Scott Lowe

If you’re unfamiliar with public key infrastructure (PKI), digital certificates, or encryption, you may find this Linux Journal article helpful. As would be expected with any maturing open source project that is starting to see increased adoption, Kubernetes has seen its share of security vulnerabilities over the last couple of months.

Storage 60