"A survey of more than 6,000 firmware images spanning more than a decade finds no improvement in firmware security and lax security standards for the software running connected devices by Linksys, Netgear and (16) other major vendors."
“We found no consistency in a vendor or product line doing better or showing improvement. There was no evidence that anybody is making a concerted effort to address the safety hygiene of their products,”
securityledger.com/2019/08/hug

"Apple accidentally unpatched a vulnerability it had already fixed, making current versions of iOS vulnerable to hackers."

"A security researcher [...] said that organizations that have the expertise to target iPhones can now use a bug in Safari, for example, to “ hack any up to date iPhone.” While it’s still not trivial to hack an iPhone remotely—even with the availability of this bug—the barriers to entry are now much lower"

vice.com/en_us/article/qvgp77/

"The not-so-secret life of boarding passes":
"What data you might be leaking publicly on that anachronistic piece of paper you discard in the seat in front of you. Turns out it is an awful lot more than you think…"
red-goat.com/osint/boarding_pa

"Australian Signals Directorate launches open source​ data visualisation tool":
"ASD touts Constellation as a data analysis application enabling data access, federation, and manipulation activities across large and complex datasets."
zdnet.com/article/australian-s

"La carte vitale sur smartphone"
Ah, puis tu lis ça plus loin dans l'article:
"Par ailleurs, cette application permettra d’éviter la paperasse, mais devrait contribuer à réduire les fraudes."
Et là un instant de doute et tu rigoles...
Connaissent pas Android ces gens-là 🤔 👌 👏 😈

sciencepost.fr/la-carte-vitale

"Phone Numbers Exposed By Inconsistent Password Reset Processes": "Lack of standardization of the password reset procedures of web services can help hackers find the phone number linked to a victim's email address."
bleepingcomputer.com/news/secu

Meet the Knob or when the specs sucks: "The encryption key length negotiation process in Bluetooth BR/EDR Core v5.1 and earlier is vulnerable to packet injection by an unauthenticated, adjacent attacker that could result in information disclosure and/or escalation of privileges." knobattack.com/

Remember the times where it was MacIntosh and not only Mac ? 😃
On the second photo, the antenna is for BI-BOP, kind of mobile telephony in France during the nineties: fr.wikipedia.org/wiki/Bi-Bop 😍 Unfortunately, i have to find some screens...

This is very astonishing: the brain is able to handle additionnal robotical arms wile it's using to two natural hands in "complicated" tasks: twitter.com/mashable/status/11

**Germany believes no-deal Brexit 'highly likely': Handelsblatt**

"Germany's government expects Britain to crash out of the European Union on Oct. 31 without a deal in place on their future relations, the Handelsblatt business daily reported on Thursday, citing a finance ministry document. "

reuters.com/article/us-britain

#news #bot

Security by Biometry you said ? These aren't easy to change:
"Major breach found in biometrics system used by banks, UK police and defence firms" theguardian.com/technology/201

If http2 is enabled in your server, you will surely need to update it:
"In an advisory today, Netflix says that all the attack vectors are variations of the same theme, where a client triggers a response from a vulnerable server and then refuses to read it. [...] The list includes big names like Amazon, Apache, Apple, Facebook, Microsoft, nginx, Node.js, and Ubuntu."
bleepingcomputer.com/news/secu

Show more
Mastodon @ SDF

"I appreciate SDF but it's a general-purpose server and the name doesn't make it obvious that it's about art." - Eugen Rochko