Cybersecurity

Why the Security of USB Is Fundamentally Broken | Threat Level | WIRED

Computer users pass around USB sticks like silicon business cards. Why the Security of USB Is Fundamentally Broken http://www.wired.com/2014/07/usb-security/ article tells that we typically depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. But the security problems with USB devices run deeper than

Anniversary of the NSA revelations

This week marks the year of Edward Snowden NSA revelations began. I have covered news on NSA relevations on my blog pretty much (Security trends 2013 and Security trends 2014). Register magazine article NSA: Inside the FIVE-EYED VAMPIRE SQUID of the INTERNET is a good wrap-up of what has been revealed over the years and

Creating Secure Software for Linux

Are you writing software that needs to be secure? Quite probably. Security critical programs include application programs used as viewers of remote data, web applications (including CGI scripts), network servers, and setuid/setgid programs.  Secure Programming for Linux and Unix HOWTO — Creating Secure Software on-line book provides a set of design and implementation guidelines for