USB firewall robertfisk/USG Wiki
https://github.com/robertfisk/USG/wiki Check out this firewall for protecting USB port. →
https://github.com/robertfisk/USG/wiki Check out this firewall for protecting USB port. →
https://www.theregister.co.uk/2017/03/02/aws_s3_crash_result_of_fatfingered_command/ →
http://boingboing.net/2017/02/28/internet-of-shitty-toys.html From article: As I’ve argued before: there is no IoT business model. Hardware starts at a 2% margin and falls from there. IoT companies get capital by promising to monopolize an “ecosystem” — controlling app stores, service, parts, and consumables, and by collecting as much data as possible in case they might get an exit by selling →
https://www.wired.com/2017/02/sky-net-illegal-drone-plan/ This is a long article on public safety challenges drones can cause and ideas how to defeat drone attacks. →
https://www.cyberciti.biz/hardware/the-librem-13-v1-a-full-fledged-modern-laptop-with-coreboot-for-freedom-and-privacy-freaks/ This laptop is more open than most PCs. →
https://thecorrespondent.com/10221/security-for-sale-the-price-we-pay-to-protect-europeans The European Union has deep pockets when it comes to security. Major defense contractors and tech giants compete for generous subsidies, to better protect us from crime and terrorism. At least that’s the idea. But who really benefits? The public or the security industry itself? →
http://www.pcworld.com/article/3173612/security/eleven-year-old-root-flaw-found-and-patched-in-the-linux-kernel.html →
http://spectrum.ieee.org/tech-talk/telecom/internet/new-online-fingerprinting-technique-works-across-browsers Browsing the web just got a little less anonymous. The software that lets web sites identify you by certain characteristics of your computer and software was usually thwarted if you switched browsers. But now computer scientists have developed new browser fingerprinting software that identifies users across web browsers →
https://arstechnica.com/security/2017/02/serious-cloudflare-bug-exposed-a-potpourri-of-secret-customer-data/ →
http://resources.infosecinstitute.com/critical-review-pki-security-policies-message-digestshashes/ →