The pitfalls of neglecting security ownership at the design stage

For companies to avoid bleeding millions through cyber threats, they must build adaptability into their security strategy from the start while considering a range of inputs that go beyond the IT and network access aspects. In this Help Net Security int… Continue reading The pitfalls of neglecting security ownership at the design stage

New quantum random number generator could revolutionize encryption

Digital information exchange can be safer, cheaper and more environmentally friendly with the help of a new type of random number generator for encryption developed at Linköping University. Experimental setup of the quantum random number generator. The… Continue reading New quantum random number generator could revolutionize encryption

LibreOffice: Stability, security, and continued development

LibreOffice, the most widely used open-source office productivity suite, has plenty to recommend it: it’s feature-rich, user-friendly, well-documented, reliable, has an active community of developers working on improving it, and it’s free. … Continue reading LibreOffice: Stability, security, and continued development

Organizations losing business due to connected product security concerns

59% of executives with cybersecurity decision-making responsibility at large and mid-sized companies say that their organizations have lost business due to product security concerns for connected devices and embedded systems, according to a Ponemon Ins… Continue reading Organizations losing business due to connected product security concerns

Dispense with the chasm? No way!

Pragmatic customers are being forced to adopt because they are under duress. It is not that they buy into the vision of software eating the world. It is because their very own lunches are being eaten. Continue reading Dispense with the chasm? No way!

Hackers try to bug PHP programming language in supply chain cautionary tale

Unidentified hackers have tried to plant malicious code in PHP, a programming language used in an estimated 79% of websites. The developers who maintain PHP said Sunday that the attackers likely broke in through a PHP server, and made two “commits,” or attempted changes to the PHP source code. It’s but one example of the supply-chain vulnerabilities inherent in the basic building blocks of popular websites. “While investigation is still underway, we have decided that maintaining our own git infrastructure is an unnecessary security risk, and that we will discontinue the git.php.net server,” Nikita Popov, a software developer who helps maintain PHP, said in a statement. Popov said PHP would move its code repositories to GitHub, an open-source platform for software developers.      Popov did not immediately respond to a request for comment, but told Bleeping Computer that PHP’s maintainers had caught the malicious code before it was introduced publicly […]

The post Hackers try to bug PHP programming language in supply chain cautionary tale appeared first on CyberScoop.

Continue reading Hackers try to bug PHP programming language in supply chain cautionary tale

Cardboard Models Trace Design Process of Vintage Tektronix Miniscopes

There aren’t many brands that inspire the kind of passion and fervency among its customers as Tektronix does. The venerable Oregon-based manufacturer of top-end test equipment has produced more collectible gear over the last 75 years than just about anyone else.

Over that time they have had plenty of innovations, …read more

Continue reading Cardboard Models Trace Design Process of Vintage Tektronix Miniscopes

Pulse Oximetry Sensor Judges Your Coffee Roast

Parts designed and marketed for a specific application can nevertheless still be useful in other ways, and whenever that happens, it’s probably the start of a pretty good hack. Using a sensor for something other than its intended purpose is exactly what [Zach Halvorson] did to make the Roast Vision …read more

Continue reading Pulse Oximetry Sensor Judges Your Coffee Roast