Categories
bug

The machine Fired me

What happens when there’s things are fully automated with no manual override.
In the relentless drive towards cost-cutting and automation I won’t be surprised if we see more instances of such problems.

At least a year later, I can sit here and write about it without feeling too embarrassed. So that’s the story about the machine that fired me and no human could do anything about it.

Source: The machine Fired me

Categories
security sysadmin

WINDOWS NTFS TRICKS COLLECTION

A collection of eye-opening NTFS tricks to do things that you normally can’t.

TRICK 1: CREATE FOLDERS WITHOUT PERMISSIONS (CVE-2018-1036/NTFS EOP) On Windows you can assign “special permissions” to folders like permissions that a user is allowed to create files in a folder, …

Source: MOV AX, BX Code depilation salon: Articles, Code samples, Processor code documentation, Low-level programming, Working with debuggers WINDOWS NTFS TRICKS COLLECTION

Categories
security

Malware Found In The Ubuntu Snap Store – Linux Uprising Blog

Be careful what you install, even if it’s from the official app/repository store. This also goes for browser extensions, docker images, Notepad++ add-ons, etc.

Oh, snap! Just because some packages are available to install directly from the Ubuntu Software Center doesn’t make them safe. This is proved by a recent discovery of malware in some snap packages from the Ubuntu Snaps Store.

Source: Malware Found In The Ubuntu Snap Store – Linux Uprising Blog

Categories
security

Malaysia general election candidates slam ‘dirty trick’ spam calls; Najib orders action

This is the classic DDoS attack, but with a twist. Instead of spamming servers through the Internet, someone is spamming phone lines through a phone botnet. Similar to DDoS, this makes it difficult for legitimate calls to go through.

Candidates for Malaysia’s 14th general election have claimed that their phones have been hacked and spammed with calls from overseas numbers.

Source: Malaysia general election candidates slam ‘dirty trick’ spam calls; Najib orders action

Categories
security

Drive-by Rowhammer attack uses GPU to compromise an Android phone

Your mobile phone may be hacked when visiting a hostile website. Researchers have used the Rowhammer attack to successfully run unauthorized code.

JavaScript based GLitch pwns browsers by flipping bits inside memory chips.

Source: Drive-by Rowhammer attack uses GPU to compromise an Android phone

Categories
privacy

Facebook scraped call, text message data for years from Android phones

I’ve been saying this for ages. iOS privacy and app permission handling is superior to Android from the start.

Maybe check your data archive to see if Facebook’s algorithms know who you called.

Source: Facebook scraped call, text message data for years from Android phones

Categories
security

ACME v2 and Wildcard Certificate Support is Live

Great news for web security. There’s no excuse not to adopt HTTPS for your website. We have reached the tipping point for HTTPS adoption and hopefully this will encourage the rest to do so.

Source: ACME v2 and Wildcard Certificate Support is Live

Categories
internet

AMP for email is a terrible idea

I totally agree with this article. Email is fine as-is. There’s no need to make it more “interactive” or “engaging” – we have the web for that. Email is one of the last vestige of the open internet that hasn’t been locked down into a walled garden. Please keep it that way.

Google just announced a plan to “modernize” email, allowing “engaging, interactive, and actionable email experiences.” Does that sound like a terrible idea to..

Source: AMP for email is a terrible idea

Categories
privacy security

Maersk Reinstalled 45,000 PCs and 4,000 Servers to Recover From NotPetya Attack

A heroic effort by the IT team from Maersk. But this just goes to show the huge impact that randomware can have on today’s businesses.

The world’s largest container shipping company —A.P. Møller-Maersk— said it recovered from the NotPetya ransomware incident by reinstalling over 4,000 servers, 45,000 PCs, and 2500 applications over the course of ten days in late June and early July 2017.

Source: Maersk Reinstalled 45,000 PCs and 4,000 Servers to Recover From NotPetya Attack

Categories
3D

WebGPU demos

The dust has yet to settle on WebGL2 and we’re already looking at a replacement…
Apple is pushing for WebGPU, which is modelled after Metal, their graphics library for iOS and macOS.

Hello World Triangle

Here’s another view about what’s wrong with WebGL/WebGL2.

Source: WebGPU demos