162490616
submission
Bismillah writes:
Work is afoot to fix up 1980s design "mistakes" for IPv4, which could potentially free up another 419 million addresses for use..
Some software changes needed for this to happen, but will it be practical to implement Seth Schoen's suggestions?
162336298
submission
Bismillah writes:
Single wavelength, single fibre pair GPON upgrade planned that will run over the wholesale Ultrafast Broadband (UFB) network that's part government-funded.
136281628
submission
Bismillah writes:
A software engineer in Melbourne is whiling away the city’s lockdown by creating a tool that DOS users so far have lacked: an integrated Linux environment similar to what Windows 10 users enjoy.
107733216
submission
106900040
submission
Bismillah writes:
Researchers have published the results of exploring how vulnerable Thunderbolt is to DMA attacks, and the answer is "very". Be careful what you plug into that USB-C port. Yes, the set of vulnerabilities has a name: Thunderclap.
106088922
submission
Bismillah writes:
As an illustration of the dangers of giving governments backdoors into systems and networks, Russia's government reusing the mandatory remote access credentials for business IT systems in the country is hard to beat. Researchers found the reused creds on thousands of open MongoDB instances in Russia but it took three and a half years to fix the problem.
104806088
submission
Bismillah writes:
Opposition Labor folds, and Australian law enforcement now has legal powers to force IT vendors and service providers to break encryption.
The new law was widely opposed by the tech industry which fears it will be caught between a rock — the Access and Assistance law — and privacy and security regulation and legislation. Will this mean Australia will become terra nullius for tech companies?
103815619
submission
Bismillah writes:
China Telecom is up to no good with BGP shenanigans researchers have discovered.. The state-owned telco is hijacking and rerouting internet traffic to China via it's US and Canadian PoPs.
102563996
submission
Bismillah writes:
Last week, officials from the Five-Eyes countries (US, Canada, UK, Australia and New Zealand) issued a statement saying tech providers will have to come up with a way to provide lawful access to encrypted data, or else. How tech companies do it is up to them, but they will have to do it. Plus, uploads of illicit content must be prevented. If it can't be prevented, providers have to take such content with all haste.
102011064
submission
Bismillah writes:
Hashcat developers tried to poke holes in WPA3 and found a way to attack WPA/WPA2 instead.
97010101
submission
Bismillah writes:
A 37-year-old man has been arrested for hacking Australian car sharing service GoGet, police said. Apart from stealing user information, the man succeeded in illicitly using vehicles on 33 occasions between May and July last year. GoGet did not reveal the breach to users until today, so as not to jeopardise the police investigation.
96875913
submission
Bismillah writes:
The NotPetya attack on shipping giant AP Møller-Maersk caused much more damage than anyone would've expected, but the company recovered from it very quickly.
“We basically found that we had to reinstall an entire infrastructure,” the chairman of AP Moller-Maersk, Jim Hagemann Snabe said.
“We had to install 4000 new servers, 45,000 new PCs, 2500 applications, and that was done in a heroic effort over 10 days.
95734965
submission
Bismillah writes:
School admins are reporting that thousands of managed Chromebooks have suddenly forgotten their WiFi passwords and SSIDs, and can't connect to networks. The cause of the problem is unclear, but it may be related to an earlier Google service outage.
95429755
submission
Bismillah writes:
Data breaches continue to arrive hard and fast, and now Mozilla is looking at integrating Troy Hunt's HaveIBeenPwned.com database into Firefox. Work is underway to integrate the service, but there's no release date for the add-on yet.
90297137
submission
Bismillah writes:
Researchers at NATO's Cooperative Cyber Defence Centre of Excellence and Estonia's University of Tallinn have worked out how to set up communications channels using IPv6 transition mechanisms, to exfiltrate data and for systems control over IPv4-only and dual-stack networks — without being spotted by network intrusion detection systems.