… : New Intel CPU Flaw Exploits Hyper-Threading to Steal Encrypted Data … :
“A team of security researchers has discovered another serious side-channel vulnerability in Intel CPUs that could allow an attacker to sniff out sensitive protected data, like passwords and cryptographic keys, from other processes running in the same CPU core with simultaneous multi-threading feature enabled.
The vulnerability, codenamed PortSmash (CVE-2018-5407), has joined the list of other dangerous side-channel vulnerabilities discovered in the past year, including Meltdown and Spectre, TLBleed, and Foreshadow.”
… : Father of Web says tech giants may have to be split up | Reuters … :
“Silicon Valley technology giants such as Facebook and Google have grown so dominant they may need to be broken up, unless challengers or changes in taste reduce their clout, the inventor of the World Wide Web told Reuters.“
… : Smart Home: Google will Staubsaugerdaten von iRobot nutzen – Golem.de … :
What could possibly go wrong?
“Dass Kunden wollen, dass Google Daten über den Grundriss ihrer Wohnungen sammelt, ist allerdings unwahrscheinlich. Google sagte The Verge daher direkt, dass die Daten nicht im Werbegeschäft verwendet würden.“
IBM acquires Red Hat | ZDNet as reported by my old friend Steven:
“In an unexpected report, Bloomberg stated IBM is close to announcing that it will be acquiring Red Hat. The news has been confirmed. IBM is acquiring Red Hat for $190.00 per share in cash. This a total enterprise value of approximately $34 billion.”
“Rometty continued,”Most companies today are only 20 percent along their cloud journey, renting compute power to cut costs. The next 80 percent is about unlocking real business value and driving growth. This is the next chapter of the cloud. It requires shifting business applications to hybrid cloud, extracting more data and optimizing every part of the business, from supply chains to sales.”
… and Jim himself on the Red Hat blog:
“We have barely scratched the surface of the opportunity that is ahead of us. Open source is the future of enterprise IT. We believe our total addressable market to be $73 billion by 2021. If software is eating the world – and with digital transformation occurring across industries, it truly is – open source is the key ingredient.
Powered by IBM, we can dramatically scale and accelerate what we are doing today. Imagine Red Hat with greater resources to grow into the opportunity ahead of us. Imagine Red Hat with the ability to invest even more and faster to accelerate open source innovation in emerging areas. Imagine Red Hat reaching all corners of the world, with even deeper customer and partner relationships than we have today. Imagine us helping even more customers benefit from the choice and flexibility afforded by hybrid and multi-cloud. Joining forces with IBM offers all of that, years ahead of when we could have achieved it alone. Together we can become the leading hybrid cloud solutions provider.”
Here’s the full press release by Red Hat …
Reality update: Open source and the demise of proprietary software – Timescale … :
“The challenges with the open-source model
Developing a successful open-source project is not easy As we can see from its history, there has always been a tension in open source: e.g., philosophical licenses focused on preserving “freedom” vs. permissive licenses taking a pragmatic approach. But there are two larger tensions today: (1) how to balance openness with sustainability and (2) how to manage the transition to the cloud.“
Reality update: Positive Technologies – learn and secure : Advanced attacks on Microsoft Active Directory: detection and mitigation … Nice…:
“An example of DCShadow confirms that new enterprise attack vectors appear. It is essential to stay on the crest of the wave in this ocean of information security, look ahead, and act quickly.“
Reality update: Hype um “chinesische Spionagechips” kommt vom Pentagon – fm4.ORF.at …
“Die Sensationsmeldung des Wirtschaftsportals Bloomberg über manipulierte Hardware für Cloud Computing stellt sich im FM4-Faktencheck als fast völlig faktenfrei heraus. Am Freitag kam ein langerwarteter Bericht des Pentagon heraus, der vor der Elektronikfertigung in China warnt. (…) Der Börsenkurs des Motherboard-Herstellers Supermicro wurde fast halbiert, etwa 500 Millionen Dollar an Börsenwert gingen verloren. (…) In Folge gingen auch völlig unbeteiligte Hardwarefertiger aus China in den Börsenkeller, Lenovo etwa notierte am Freitag bei minus 15 Prozent. Insgesamt gingen damit mehrere Milliarden Dollar an Börsenwert den großen Datenstrom hinunter, obwohl erst Supermicro, dann Amazon und Apple in scharfen Worten dementiert hatten. Diesen Dementis folgte noch ein weiteres und zwar von Bloomberg selbst, direkt am Ende des Artikels: „Auch Bloomberg LLP ist Kunde von Supermicro. Laut einem Sprecher des Unternehmens sind keine Indizien gefunden, dass die von Bloomberg benutzte Hardware solche Probleme aufweist, wie sie im Artikel beschrieben sind.” ”
The Age Of Invisible Disasters · Privacy, Power, & Protection In The Cyber Century
Software’s Tay Bridge The Therac-25 X-ray machine killed several people around the world. All of them died a prolonged and horrible death by massive radiation overdose.
How Smart TVs in Millions of U.S. Homes Track More Than What’s On Tonight – The New York Times….
Using the Office 365 Activities API to Investigate Business Email Compromises…. MSO 365 has an undocumented API for forensics, where you can curl a user’s activity report.