Dear new developer, Sometimes you have to send a difficult or awkward email. But, before you send it, think about whether it should be an email or if an in-person conversation, phone call, or video…
Phishing campaign targets Ukraine, allies ahead of NATO summit
Documents lobbying for Ukraine's membership in the alliance are being used as lures by a campaign that appears to be linked to the RomCom hacking group, according to researchers at BlackBerry. trying to infect guests with malicious software, according cybersecurity firm BlackBerry.
SUSE Preserves Choice in Enterprise Linux by Forking RHEL with a $10+ Million Investment | SUSE
Investment reinforces SUSE’s commitment to innovate and support SUSE Linux Enterprise distributions and related open source projects
SUSE plans to contribute its code to an open source foundation
SUSE Announces Its Forking RHEL, To Maintain A RHEL-Compatible Distro
Yesterday Oracle published an interesting announcement and doubled down on their intentions of keeping Oracle Linux compatible with Red Hat Enterprise Linux following Red Hat's controversial announcement last month
Bad managers and people mailing it in are giving those of us that have worked from home for decades a bad name. | The debate over 'fake work' in the tech industry misses the real culprit: lazy managers
Tech executives and investors have claimed that loafing employees are dragging down companies. But experts say the real problem is "lazy management."
When Let’s Encrypt first launched, we needed to ensure that our certificates were widely trusted. To that end, we arranged to have our intermediate certificates cross-signed by IdenTrust’s DST Root CA X3. This meant that all certificates issued by those intermediates would be trusted, even while our own ISRG Root X1 wasn’t yet. During subsequent years, our Root X1 became widely trusted on its own. Come late 2021, our cross-signed intermediates and DST Root CA X3 itself were expiring.
A common failure mode in complex systems is that some part of the system hits a limit and falls over. In the software world, we call this phenomenon resource exhaustion, and a classic example of th…
When does an old Mac become unsafe to use? - The Mac Security Blog
Macs can last a long time, far longer than Apple will support them with macOS updates. If your Mac cannot run the latest version of macOS, it is unsafe to use online. Here are some tips for getting the most out of your old Mac, safely.
PoisonGPT: How we hid a lobotomized LLM on Hugging Face to spread fake news
We will show in this article how one can surgically modify an open-source model, GPT-J-6B, and upload it to Hugging Face to make it spread misinformation while being undetected by standard benchmarks.
As the industrial IoT looks more like IT, security must change - Stacey on IoT | Internet of Things news and analysis
This story was originally published in my July 07, 2023 newsletter. You can sign up for the newsletter here. As tensions rise between the U.S. and China and Russia continues sponsoring cybersecurity attacks around the globe, it’s clear cybersecurity is never going back to being a niche issue CEOs and boards can foist off to a CSO or IT […]
Must read! I remember a time in my life where if I got hacked I’d basically loose my job. Sucks but that’s the kind of commitment some employers want | Analyzing Attack Opportunities Against Information Security Practitioners
Security researchers are increasingly targeted for attack. In this guest post, Jared Stroud explores the risks and how practitioners can protect themselves.
When I buy a new iPhone, I tend not to spring for the top of the line where storage is concerned. Generally I’m okay going for a smaller capacity phone, because I don’t have a ton of da…