article thumbnail

Technology Short Take 139

Scott Lowe

Linux malware is getting more sophisticated. Francisco Trindade launches a series of posts that tackle the prevalent use of pull requests (PRs) in software development with the statement that PRs are considered harmful. If you have strong feelings about this, hit me on Twitter and let’s discuss. Servers/Hardware.

Vmware 60
article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

Vamosi: Rauli and I started by discussing the big picture: the beginning of the software development lifecycle, when the code is first developed, but then there’s also the other side, after the software is released and a vulnerability is found. I’ll let him introduce himself. But antimalware is niche category.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

Vamosi: Rauli and I started by discussing the big picture: the beginning of the software development lifecycle, when the code is first developed, but then there’s also the other side, after the software is released and a vulnerability is found. I’ll let him introduce himself. But antimalware is niche category.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

Vamosi: Rauli and I started by discussing the big picture: the beginning of the software development lifecycle, when the code is first developed, but then there’s also the other side, after the software is released and a vulnerability is found. I’ll let him introduce himself. But antimalware is niche category.

article thumbnail

The Hacker Mind Podcast: EP 69 Self-Healing Operating Systems

ForAllSecure

It was not a literal time machine, but a way of capturing the software development process by recording intervals and storing them in the close. Then, when a vulnerability was discovered later on, a developer could go back in time and find the moment the fault was introduced into the code. This is a novel approach to malware.