Loading...

Category: Security

Amazon EKS Security Best Practices

Following security best practices for AWS EKS clusters is just as critical as for any Kubernetes cluster. In a talk I gave at the Bay Area AWS Community Day, I shared lessons learned and best practices for engineers running workloads [ … ]

Ryuk-like malware targeting law, military and finance groups

A new malware containing some similarities to Ryuk ransomware, but which acts as an information stealer targeting military, law and financial institutions has been uncovered by MalwareHunterTeam. Once onboard a device the as-yet-unnamed malware begins its attack begins searching for [ … ]

When Biology Becomes Software

All of life is based on the coordinated action of genetic parts (genes and their controlling sequences) found in the genomes (the complete DNA sequence) of organisms. Genes and genomes are based on code– just like the digital language of [ … ]

Smart Watches and Cheating on Tests

The Independent Commission on Examination Malpractice in the UK has recommended that all watches be banned from exam rooms, basically because it’s becoming very difficult to tell regular watches from smart watches. https://www.schneier.com/blog/archives/2019/09/smart_watches_a.html