Cisco Advances Effort to Simplify Security

Cisco Systems has updated SecureX, a free console it provides for its portfolio of security offerings, to include sample extended detection and response (XDR) workflows along with additional analytics and a refreshed Ribbon interface through which sec… Continue reading Cisco Advances Effort to Simplify Security

LEGO Delivers Corvette Experience on a Budget

Many dream of tooling around in a high performance sports car, but the cost of owning, maintaining, and insuring one of them make it a difficult proposition. While this LEGO version of the Corvette ZR1 might not be exactly like the real thing, it’s 4-speed manual and electronic gauge cluster …read more

Continue reading LEGO Delivers Corvette Experience on a Budget

WaterAid Finds Potable Water and Stops Polluters

Millions of people all over the world don’t have access to clean drinking water, and it’s largely because of pollution by corporations and individuals. Solving this problem requires an affordable, scalable way to quickly judge water quality, package the data, and present it to an authority that can crack down …read more

Continue reading WaterAid Finds Potable Water and Stops Polluters

Best Practices for Scoring Your Environment’s Security Measures

For most practical uses today, a combination of hardening and vulnerability detection is required to secure even the most basic digital environment. In each area it is important to see the progress you’re making in these competencies so that you … Continue reading Best Practices for Scoring Your Environment’s Security Measures

Reverse Engineering a Saab’s In-Dash Display

For [Leigh Oliver], there’s something undeniably appealing about the green on black instrumentation of the 2003 Saab 9-3 Gen2. Perhaps it’s because the Infotainment Control Module 2 (ICM2) screen brings a bit of that classic Matrix vibe to the daily commute. Whatever the reason, it seemed the display deserved better …read more

Continue reading Reverse Engineering a Saab’s In-Dash Display

Identifying Let’s Encrypt Revoked Certificates

Let’s Encrypt is a free, automated, open certificate authority (CA) run for the public’s benefit as a service from the Internet Security Research Group (ISRG). It provides free digital certificates to enable HTTPS (… Continue reading Identifying Let’s Encrypt Revoked Certificates

Citrix ADC and Gateway Remote Code Execution Vulnerability (CVE-2019-19781)

Citrix released a security advisory (CVE-2019-19781) for a remote code execution vulnerability in Citrix Application Delivery Controller (ADC) and Citrix Gateway products. The vulnerability allows an unauthenticated remote attacker to execute arbitrary… Continue reading Citrix ADC and Gateway Remote Code Execution Vulnerability (CVE-2019-19781)

Mustang Dash Becomes Bookshelf Art Piece

Despite most of the common gauges remaining the same over the last 60 years, the automotive dashboard of days past used very different technology to those today. Cable driven speedometers were common, along with mechanical drive for the odometer, too. Fuel and temperature gauges were often wired directly to their …read more

Continue reading Mustang Dash Becomes Bookshelf Art Piece

Howto: Docker, Databases, and Dashboards to Deal with Your Data

So you just got something like and Arduino or Raspberry Pi kit with a few sensors. Setting up temperature or motion sensors is easy enough. But what are you going to do with all that data? It’s going to need storage, analysis, and summarization before it’s actually useful to anyone. You need a dashboard!

But even before displaying the data, you’re going to need to store it somewhere, and that means a database. You could just send all of your data off into the cloud and hope that the company that provides you the service has a good business model …read more

Continue reading Howto: Docker, Databases, and Dashboards to Deal with Your Data