Inside OpenSSL’s battle to change its license: Coders’ rights, tech giants, patents and more
https://www.theregister.co.uk/2017/03/24/openssl_asks_contributors_to_agree_to_apache_license/ →
https://www.theregister.co.uk/2017/03/24/openssl_asks_contributors_to_agree_to_apache_license/ →
https://horizon-magazine.eu/article/critical-infrastructures-under-daily-attack-erncip-head-georg-peter_en.html ‘Critical infrastructures around the world, not just in Europe, are constantly being targeted by cyber attacks, as are many other systems used by society which are internet-connected. Every day, European vital services and infrastructures have to be able to resist many types of cyber attacks. ‘The risk of attacks against such infrastructures is expected →
http://www.darkreading.com/application-security/security-in-the-age-of-open-source/a/d-id/1328407 Dramatic changes in the use of open source software over the past decade demands major changes in security testing regimens today. →
https://opensource.com/article/17/3/iot-security-raspberry-pi?sc_cid=7016000000127ECAAY IoT has been huge for experimentation and innovation. But as projects get rushed to completion, there have been severe consequences for ignoring security. And this applies both to commercial products and hobby projects. →
https://techcrunch.com/2017/03/19/ibm-unveils-blockchain-as-a-service-based-on-open-source-hyperledger-fabric-technology/?sr_share=facebook →
https://www.alienvault.com/blogs/security-essentials/when-your-employer-can-see-your-banking-information-decrypting-ssl Enter Next Generation firewalls and SSL Decrypts. In the traditional catchup game played between good guys and bad guys, the end user usually ends up in the thick of the action. With SSL decryption, that padlock might not be protecting you at all. First let’s take a look at how SSL decryption is setup. →
https://developers.redhat.com/blog/2017/03/06/wearable-tech-a-developers-security-nightmare/?sc_cid=7016000000127ECAAY Bad wearable device security affects companies and cloud services. →
https://business.f-secure.com/the-state-of-cyber-security-2017?utm_campaign=okimocybsectwoparttwo&utm_medium=social&utm_source=facebook&ecid=9491 →
https://developers.redhat.com/blog/2017/03/01/the-year-of-data-breaches-why-encryption-and-reformatting-ssds-is-not-enough/?sc_cid=7016000000127ECAAY A view to last year’s data breaches and what should be done to avoid them in the future. →
https://medium.com/@DalePeterson/the-future-of-scada-ics-ransomware-e7f94d36c955#.b60oxpj66 ICS are likely to see smarter ransomware and targeted attacks to get it onto ICS PLC’s, RTU’s and controllers. →