The Cryptographic Key That Secures the Web Is Being Changed for the First Time
The Cryptographic Key That Secures the Web Is Being Changed for the First Time
Soon, one of the most important cryptographic key pairs on the internet will be changed for the first time.
The Internet Corporation for Assigned Names and Numbers (ICANN), the US-based non-profit responsible for various internet infrastructure tasks, will change the key pair that creates the first link in a long chain of cryptographic trust that lies underneath the Domain Name System, or DNS, the “phone book” of the internet.
This key ensures that when web users try to visit a website, they get sent to the correct address. Without it, many internet users could be directed to imposter sites crafted by hackers, such as phishing websites designed to steal information.
Researchers show off remote attack against Tesla Model S
Researchers show off remote attack against Tesla Model S
The researchers were able to remotely control the braking system, sunroof, door locks, trunk, side-view mirrors and more
Tesla Motors is considered one of the most cybersecurity-conscious car manufacturers in the world — among other things, it has a bug bounty program. But that doesn’t mean the software in its cars is free of security flaws.
Researchers from Chinese technology company Tencent found a series of vulnerabilities that, when combined, allowed them to remotely take over a Tesla Model S car and control its sunroof, central display, door locks and even the braking system. The attack allowed the researchers to access the car’s controller area network (CAN) bus, which lets the vehicle’s specialized computers communicate with each other.
“As far as we know, this is the first case of remote attack which compromises CAN Bus to achieve remote controls on Tesla cars,” the researchers from Tencent’s Keen Security Lab said in a blog post Monday. “We have verified the attack vector on multiple varieties of Tesla Model S. It is reasonable to assume that other Tesla models are affected.”
The Failure of International Aid, Empathy, and Innovation for Syria
Announcing Spotify Infrastructure’s Googley Future
As a company most often associated with amazing music recommendations and awesome parties (not to mention life-changing employee benefits), it’s rare that we get to talk about the exciting world of technical infrastructure – the real power behind the music – but today is special. Today we are announcing that we’re working with the Google Cloud Platform team to provide platform infrastructure for Spotify, everywhere.
https://news.spotify.com/us/2016/02/23/announcing-spotify-infrastructures-googley-future/
I love Free Software Day
Free Software Foundation Europe is a charity that empowers users to control technology.
Software is deeply involved in all aspects of our lives; and it is important that this technology empowers rather than restricts us. Free Software gives everybody the rights to use, understand, adapt and share software. These rights help support other fundamental freedoms like freedom of speech, press and privacy.
Gmail Motion BETA
http://mail.google.com/mail/help/motion.html
Nicely done! I have been laughing all morning.
Help Solve an Open Murder Case – (Seriously?)
Cryptanalysts
Part 2: Help Solve an Open Murder Case03/29/11
On June 30, 1999, sheriff’s officers in St. Louis, Missouri discovered the body of 41-year-old Ricky McCormick. He had been murdered and dumped in a field. The only clues regarding the homicide were two encrypted notes found in the victim’s pants pockets.
Despite extensive work by our Cryptanalysis and Racketeering Records Unit (CRRU), as well as help from the American Cryptogram Association, the meanings of those two coded notes remain a mystery to this day, and Ricky McCormick’s murderer has yet to face justice.
“We are really good at what we do,” said CRRU chief Dan Olson, “but we could use some help with this one.”
In fact, Ricky McCormick’s encrypted notes are one of CRRU’s top unsolved cases. “Breaking the code,” said Olson, “could reveal the victim’s whereabouts before his death and could lead to the solution of a homicide. Not every cipher we get arrives at our door under those circumstances.”