-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


Security Leftovers


Posted by Roy Schestowitz on Apr 10, 2023


Programming Leftovers

Review: carbonOS 2022.3, LibreELEC 11.0, Kodi 20.1



LibreSSL 3.7.2 Released


↺ LibreSSL 3.7.2 Released



How organizations can prepare for post-quantum cryptography


↺ How organizations can prepare for post-quantum cryptography


> Overall, the primary concern driving preparedness from a security perspective is that encryption is breakable due to advancements in post-quantum computing for both asymmetric and symmetric cryptography. Most researchers put this possibility 10 to 15 years out from now, but they acknowledge we could be surprised by technological advancements.



Josh Bressers: Episode 370 – Open Source is bigger than you can imagine


↺ Josh Bressers: Episode 370 – Open Source is bigger than you can imagine


> Josh and Kurt talk about some data on the size of NPM. Josh wrote a blog post and a report about the amount of SEO spam in NPM was released. Open source is enormous, and it’s mostly one person. It’s hard to imagine how this all works sometimes and this lack of understanding can create challenges.


↺ Josh

↺ Kurt


↺ Josh

↺ Kurt



Inside the international sting operation to catch North Korean crypto hackers


↺ Inside the international sting operation to catch North Korean crypto hackers


> A team of South Korean spies and American private investigators quietly gathered at the South Korean intelligence service in January, just days after North Korea fired three ballistic missiles into the sea.


> For months, they'd been tracking $100 million stolen from a California cryptocurrency firm named Harmony, waiting for North Korean hackers to move the stolen crypto into accounts that could eventually be converted to dollars or Chinese yuan, hard currency that could fund the country's illegal missile program.


> When the moment came, the spies and sleuths — working out of a government office in a city, Pangyo, known as South Korea's Silicon Valley — would have only a few minutes to help seize the money before it could be laundered to safety through a series of accounts and rendered untouchable.



Major Cyber Insurance Overhaul Begins Now


↺ Major Cyber Insurance Overhaul Begins Now


> One thing is clear about cyber insurance in the spring of 2023: The status quo is not sustainable.


> And now, Lloyd’s of London, a major player in the global insurance market, is calling for dramatic changes in the cyber insurance market. According to The Financial Times (FT), “From next month, Lloyd’s will require the dozens of insurers that operate in the market to include exemptions that would prevent policies paying out if a major attack is judged to be ‘state-backed.’


> “Exclusions for acts of war have long been a staple of policies ranging from property to motor, shielding insurers from the potentially crippling claims that a physical conflict generates. But Lloyd’s, a powerhouse in the global industry, believes war exclusions need updating for the Internet age, when cyber warfare can be government sponsored even in the absence of conventional conflict. Failure to exclude significant state-backed attacks from policies would leave insurers exposed to 'systemic risk,' Lloyd’s said when it first announced the plan last summer.”



NZZ has to shut down the newspaper production system after a cyber attack


↺ NZZ has to shut down the newspaper production system after a cyber attack


> The “exceptional situation” is also associated with a reduction in the size of the print edition. According to media reports, the attackers are demanding a ransom for the blocked system.


> The “Neue Zürcher Zeitung” continues to struggle with problems two weeks after a cyber attack on its computers. The publisher shut down central systems for newspaper production and had to pre-produce the Saturday edition on Thursday. The company announced on Saturday that this “exceptional situation” was also associated with a reduction in scope. Due to the cyber attack, some systems and services are still not available.




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Sat Jun 1 06:52:01 2024