Submitted by Daniel on Sat, 04/12/2014 - 14:46
Websites that exchange sensitive information with users have, for many years now, secured the connection between a users browser and the web site by encrypting the information. The system is called SSL for Secure Sockets Layer and TLS for Transport Layer Security and up until the begriming of 2012 the software that implemented these techniques, OpenSSL protected the information as it flowed over the Internet by making it unreadable to anyone other than the intended recipient. A programming mistake (A missing bounds check) introduced into the software introduced a flaw in a function of the TLS protocol called heartbeat.
That flaw allowed a non-standard heartbeat command to return 64 KB or about 32 pages of text of unencrypted data. In effect, the programming error allowed an attacker to access the very information that SSL/TLS was intended to protect. Named for the heartbeat function that allows the data to be viewed by attackers, the bug has become known as Heartbleed.
Submitted by Daniel on Sat, 03/29/2014 - 12:19
April 8 2014 is the last day that Microsoft will support it’s Windows XP operating system. This is important for anyone with a computer running XP because that is the date Microsoft will stop issuing patches, or fixes, to the software leaving users vulnerable to attack when new exploits are found but not fixed. Windows XP was first released in October of 2001 - over 12 years ago. One might think that 12 years would be enough time to find and fix all the bugs in the software that allowed attackers to take over your computer but then one would be wrong. There have been 9 “critical” or “important” patches released for XP during the first few months of 2014.
Submitted by Daniel on Sat, 03/22/2014 - 11:22
Submitted by Site Administrator on Wed, 03/19/2014 - 00:00
The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden.
Submitted by Site Administrator on Sat, 01/11/2014 - 15:23
After years of speculation that electronics can be accessed by intelligence agencies through a back door, an internal NSA catalog reveals that such methods already exist for numerous end-user devices. Read the full article here.
Submitted by Daniel on Mon, 12/23/2013 - 22:50
Take up the President's call to code - create a a free account at Code Academy and learn to code. Stop complaining about buggy software and write your own health care exchange.
Submitted by Daniel on Tue, 12/10/2013 - 10:05
Submitted by Site Administrator on Mon, 12/09/2013 - 08:44
By Barton Gellman and Ashkan Soltani, Published: December 4
Submitted by Site Administrator on Sun, 12/01/2013 - 18:19
Submitted by Daniel on Sun, 09/01/2013 - 16:58
By Zoë Keating
September 1, 2013
This year marks the 10th anniversary of the day I quit my software job. There was nothing wrong with my job; it was rewarding and I liked it, but "information architect" was not my calling. I didn't want to sit at a computer all day. I wanted to make music.