How to secure your router and home network

Many computer users don’t realize it, but for most people their internet router is the most important electronic device in their home. It links most of their other devices together and to the world, so it has a highly privileged position that hackers can exploit.
Unfortunately, many consumer and small-business routers come with insecure default configurations, have undocumented backdoor accounts, expose legacy services and have firmware that is riddled with basic flaws. Some of these problems can’t be fixed by users, but there are many actions that can be taken to at least protect these devices from large-scale, automated attacks.
Don’t let your router be a low-hanging fruit for hackers.To read this article in full or to leave a comment, please click here


Original URL: http://www.computerworld.com/article/3093427/security/how-to-secure-your-router-and-home-network.html#tk.rss_all

Original article

Facebook to Add End-To-End Encrypted ‘Secret Conversations’ to Messenger App

Photo

David Marcus, who leads the Messenger operation at Facebook, addressing a conference in San Francisco.

Credit
Jim Wilson/The New York Times
MENLO PARK, Calif. — Two years ago, Messenger, a photo and text messaging service, appeared to be almost an afterthought at Facebook, the social networking giant.Messenger often took a back seat to the limelight enjoyed by WhatsApp, the messaging app that Facebook had bought for $19 billion. And Messenger’s capabilities were so limited that you could not send friends an animated GIF of a dancing Shiba Inu, as you could with many other messaging services.But since mid-2014, Facebook has been playing a furious game of catch-up with Messenger. That June, Facebook’s chief executive, Mark Zuckerberg, hired a PayPal executive, David Marcus, to take over Messenger and build it into a world-class competitor. The company has added a string of features to the service, including letting


Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/5z2Uyjjg3as/facebook-messenger-app-encryption.html

Original article

Pi-based BBC Micro Co-Processor

Dave [hoglet] and I are pleased to announce the PiTubeDirect project – some of you will have seen Dave’s Pi-connecting breadboard circuit in Halifax, hooked up to an Atom.Long story short, with just two chips and a Raspberry Pi, you too could rig up a 100MHz second processor and connect it to the nearest Tube interface: Beeb or Master (or even Elk or Atom if you’ve got a tube interface.) You might even be able to build it for a tenner. Plus postage. A Pi Zero works well, but a Pi 3 is faster – almost any Pi will do. Here’s a chance to dust off that Pi you bought and don’t know what to do with.We should say that this is still an ongoing project – getting everything compatible with all hosts and getting the last few oddities sorted out is still in progress. We’re using Tube Elite as


Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/rpNcw3WVizE/viewtopic.php

Original article

Release of IPython 5.0

We are pleased to announce the release of IPython 5.0 LTS (or Long Term Support). IPython is the Python kernel for Jupyter and the interactive Python shell; it provides a rich set of features for fluid interactive computation in Python at the terminal, in the Jupyter Notebook and across all other clients that support the Jupyter architecture.

This release has some exciting new features and lots of new development (227 commits by 27 contributors over 191 PRs). Most importantly, there have been significant improvements to the classic IPython command line interface.

As usual you can try this new release with:

pip install ipython –upgrade

The package should also be available through conda and other package managers in the next few days.

Note: IPython is now developed under the umbrella of the broader Project Jupyter, but like other components of Jupyter, with its own independent schedule. Therefore, this release does not impact the Jupyter


Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/JZNi4U_Daxk/

Original article

Comcast’s Netflix Deal Could Open a New Front in Net Neutrality War

You can now use Netflix with Comcast’s TV service. And that could make the set-top box the next front in the battle to keep the Internet truly neutral. The post Comcast’s Netflix Deal Could Open a New Front in Net Neutrality War appeared first on WIRED.


Original URL: http://www.wired.com/2016/07/comcasts-netflix-deal-open-new-front-net-neutrality-war/

Original article

Security Flaw in OS X displays all keychain passwords in plain text

Security Flaw in OS X displays all keychain passwords in plain textThis afternoon, a friend learned the hard way that you don’t let an unofficial company take control of your computer to provide “support”. However, it was what I learned that shocked me the most.There is a method in OS X that will allow any user to export your keychain, without sudo privileges or any system dialogs, to a text file, with the username and passwords displayed in plain text. As of this writing, this method works in at least 10.10 and 10.11.5, and presumably at the least all iterations in between.The method consists of opening up terminal, and cutting and pasting the following code:security dump-keychain -d login.keychain > keychain.txtYou can circumvent all system dialogs by scripting that terminal command and adding the following:tell application “System Events”repeat while exists (processes where name is “SecurityAgent”)tell process “SecurityAgent”click button “Allow” of group


Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/cG_9wyZv5Gk/security-flaw-in-os-x-displays-all-keychain-passwords-in-plain-text-a530b246e960

Original article

Proudly powered by WordPress | Theme: Baskerville 2 by Anders Noren.

Up ↑

%d bloggers like this: