Skip to main content

Security

Navigating the container security ecosystem

posted onMay 28, 2018
by l33tdawg

SJ Technologies partnered with Sonatype for the DevSecOps Community 2018 Survey. The survey was wildly popular, receiving answers from more than 2,000 respondents representing a wide range of industries, development practices, and responsibilities. One-third of respondents (33%) came from the technology industry, and banking and financial services was the second most represented group (15%). 70% of all respondents were using a container registry. With so many respondents utilizing containers, a deeper dive into container security is in order.

Epyc Fail? Researchers Say They Can Defeat AMD’s Virtual Machine Encryption

posted onMay 28, 2018
by l33tdawg

German researchers reckon they have devised a method to thwart the security mechanisms AMD's Epyc server chips use to automatically encrypt virtual machines in memory.

So much so, they said they can exfiltrate plaintext data from an encrypted guest via a hijacked hypervisor and simple HTTP requests to a web server running in a second guest on the same machine.

Oracle Plans to Drop Java Serialization Support, the Source of Most Security Bugs

posted onMay 28, 2018
by l33tdawg

Oracle plans to drop support for data serialization/deserialization from the main body of the Java language, according to Mark Reinhold, chief architect of the Java platform group at Oracle.

Serialization is the process of taking a data object and converting it into a stream of bytes (binary format), so it can be transported across a network or saved inside a database, only to be deserialized later and used in its original form.

Woman says Alexa recorded and shared the private conversation she was having with her husband

posted onMay 28, 2018
by l33tdawg
Credit: alexa

I don’t have an voice-activated assistant in my home.

Call me paranoid if you like, but I just don’t like the idea of some internet-enabled gadget always “listening” to what’s being said, waiting to hear if it’s being given a voice command. By my reckoning I’ve survived just fine for forty-cough years without a voice-activated assistant, so I’ll probably be just fine without one.

Your logo and branded vulnerability aren't helping: How to disclose better

posted onMay 27, 2018
by l33tdawg

In 2000, I leapt out of journalism and in to security communications. I was relocating to the San Francisco Bay Area and, despite the downturn, tech was king. I also wanted to lend my unique albeit non-technical skill set to a technology that protected people or, at the very least, attempted to reduce harm caused by malicious behavior.

New speculative-execution vulnerability strikes AMD, ARM, and Intel

posted onMay 22, 2018
by l33tdawg

L33tdawg: Sounds a bit like this talk that's up for voting at HITBGSEC in Singapore

A new attack that uses processors' speculative-execution capabilities to leak data, named Speculative Store Bypass (SSB), has been published after being independently discovered by Microsoft's Security Response Center and Google Project Zero. Processors from Intel and AMD, along with some of those using ARM's designs, are all affected.