NSS Labs: Next Generation Firewall Test
“NSS Labs is issuing a call for industry engagement from both enterprises and NGFW vendors to help shape and evolve the ninth iteration of our NGFW Group Test.” Read the full press release:
41 posts • joined 18 Jun 2018
I got a similar answer from EDF when I asked them why I needed to disable 'Auto remove overlays', 'uBlock Origin' and Safescript in order to access the site. So while I use these sites I'm totally open to click-jacking and running malware scripts. Are these sites run on a hacked together script based on some school project of ten years ago?
‘Like other open source communities, Python's minders have been asked whether they really want to continue using the terms "master" and "slave" to describe technical operations and relationships’
Where, when, how, I've never heard it was an issue up to now. Yet another example of the intersectionality crowd finding something to be offended over. In this case potentially being triggered by a line of code. What are we going to call the Master-Slave JK Flip Flop after this, the Facilitor-Stakeholder J K Flip Flop
How about getting someone to write a script that periodically tests your cloud infrastructure for potential leaks and sends an email or text msg to someone who will notice?
“It was found that one of the True Key Service binaries loads a McAfee dynamic library in an insecure manner. An adversary could carefully craft an exploit to launch an Elevation of Privilege attack.” ref
How about designing the DLL loading routine to, by default, not allow unsigned DLL loading, that way any defect in the application would be rendered fail-safe. Presumably this flaw in the DLL side-loading mechanism can be exploited by any malicous application.
> *WHY* are image files loaded up (and apparently parsed) within the kernel again?
To speed up rendering else there's too much of a performance hit switching from kernel mode to user mode, hence any defect in the code can crash the entire system or lead to a security violation
‘I speak as one part of his "useless class" who can't even beat a normal chess program on my crappy computer.’
Can this ‘normal chess program’ write a program that can beat it in chess, I know I can. The reason the chess-program wins is it substututes speed over intelligence. If you could slow down or stop the clock between moves then you could most definitely win.
Apropos artificial intelligence, this whole AI thing is just so much hyped snakeoil, we're decades away from any real-world practical solution. In this case I guess it's a good a pretext as any to fling $2bn at the US military. A technological solution to a human problem, the problem being how to the ability to kill more of the enemy than he can kill yours. The snakeoil being the promise of fighting a war without taking human loses. Stalingrad and the Vietnam War would have demonstrated the falsehood of thinking technology could win against a tenacious and dedicated low-tech enemy.
“Banks such as China Union Pay, AI Bank and the Agricultural Bank of China are using MLK-DNN Baidu’s Cloud for fraud detection. iQiyi, commonly referred to China’s answer to Netflix, will use OpenVINO to flag up videos for dodgy content.”
Does this mean that a company from the freedom loving west is teaming up with a communist dictatorship to spy on its own citicizens, for money?
How about instead, they make our Public Records available on the Internet, instead of having to pay-per-page to see it through multiple Freedom of Information applications, which will then only be returned to you in the form of photocopies and by surfacemail.
How about an email service that transparently verifies that an email is really from the name appearing in the FROM: box and full -end-to-end encryption to be sure no third party is snooping on your emails.
This isn't Artificial Intelligence (AI) beating astroboffins, what it is, is a pattern recognition engine based on a convolutional neural network (CNN), detecting seventy two new sources of fast radio bursts (FRB) after being trained by humans. As for signs of extraterrestrial technology, since FRB 121102 is three billion light years away, and assuming we detect an artificial signal three billion years old, does anyone think humanity will still exist in three billion (3,000,000,000) years ?
As someone else pointed out "OS haven't actually got quicker over the last few decades", bigger isn't necessarly better. What is the best distro for running from a USB device?
Is the the same Cisco that impliments SSL decryption on its switches, through the use of fake PKI certs. Basically implimenting a man-in-the-middle attack.The client browser has to be configered to accept such fake certs and not just the Cisco ones.
Cisco “Talos says that it is classifying Remcos as a Remote Access Trojan (RAT) software”
There are any number of remote desktop solutions that do the exact same thing, why aren't these also deemed RAT software. How does Remcos get installed on the target system in the first place, without root access and the end-user not noticing? Lets consult the Remcos Manual: “Deploy the agent file on your system to be controlled and execute it”.
> SLES will end up being digested somewhere in the bowels of MS's beasty clouds ..
SuSE Linux being the only one that comes with a Microsoft covenant-not-to-sue. Microsoft also extracting a license fee from Android phone makers. If I was paranoid I would sense something sinister in the force.
“The Flight Information Display System (FIDS) at Gatwick Airport was the result of a project that kicked off back in 2015 to replace legacy systems that required a separate PC running behind the majority of the airports’ screens”
Running the screens from the one 'cloud' solution through a single fibre cable sounds like some bean-counters idea of saving money. Multiple devices running multiple screens with multiple data paths is the correct solution. You could do it with Raspberry Pis connected in a banyan-tree topology.
“Fully web-based and Windows compliant. COMPAS is applicable to offenders at all levels from non-violent misdemeanors to repeat violent felons. COMPAS offers separate norms for males, females, community and incarcerated populations.” ref
“A recent investigation by ProPublica showed that this predictive technology was operating with significant racial biases” ref
> spare a thought for the poor sods developing this stuff 14 years ago.
March 2008: “a team of computer security researchers plans to report Wednesday that it had been able to gain wireless access to a combination heart defibrillator and pacemaker.” ref
“use cases for an on-prem Azure cloud would include things like field offices or government embassies where officials would not want sensitive information to be travelling over potentially tapped internet connections.”
If yer local cloud is connected to your hybrid cloud through the Internet then ...
“This is possible because Azure Stack extends the best of our intelligent edge and cloud innovation and delivers those services anywhere in the environment through a hybrid approach.”
"The internet originates from the US government's interest in creating a communications system which could reliably survive a major nuclear war."
No no no, despite no matter how many time that inexactitude is repeated, the Internet wasn't designed to survive a nuclear war. The Arpanet was about time-sharing expensive computing.
“It was from the RAND study that the false rumor started claiming that the ARPANET was somehow related to building a network resistant to nuclear war.
This was never true of the ARPANET, only the unrelated RAND study on secure voice considered nuclear war. However, the later work on Internetting did emphasize robustness and survivability, including the capability to withstand losses of large portions of the underlying networks.”
Registered Trademarks - INPI 411476
Person: Joao Silveira
Phone: +351220915985, Portugal: 707 450 060, UK/Europe: +44-2035143750, USA/Canada: 1-877-379-2127
Data de Submissão: 05-08-2013
Data de Expiração: 04-08-2022
Titular: EBONYHORIZON TELECOMUNICAÇÕES, S.A. Rua 28 de Janeiro 350 - Edificio X, Vila Nova de Gaia, Praceta da Geminação, N.º 19, 1º Dto, Tras., 4400-335 Vila Nova de Gaia, PT email@example.com
"Two years ago researchers warned that Netgear routers with remote data access capabilities were susceptible to attack if the default FTP authentication credentials were not updated .. Recorded Future identified more than 4,000 routers susceptible to attack."
Describing accessing a device using the default credentials as an 'attack' is stretching it.
"the controller shall .. notify the personal data breach to the supervisory authority .. unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons."
So, no sanctions for such leaks and no requirement to report such leaks to the leaked-on. The only practical effect I've seen is multiple click-boxes on websites and some US websites blocking access in Europe.
'Clearly AMD has been spinning this crap .. AMD is the one hiding and spreading fake info against its competitors.'
Actually it was AMD on the receiving end of such speculative crap, mainly by CTS that "may have, either directly or indirectly, an economic interest in the performance of the securities of the companies whose products are the subject of our reports."
Regarding the shutterstock illustration titled 'Two people standing by a water cooler'. Shouldn't that be: Two people, not a member of the Caucasian patriarchy, standing by a water cooler :]
'The carmaker instituted an internal review, and in September 2017 found it was using “unauthorised technicians” to carry out final vehicle inspection tests for vehicles sold in Japan.'
I call baloney on that, senior management instructed the technicians to fake the results as the equipment was unable to conform to emission standards.
"the company also re-checked safety records for cars produced at the affected plants, except GT-R models (for which there weren't enough sold to make a statistical assessment)"
We fraudulently alter vehicle inspection tests and the GT-R models we sold have no safety issues as we didn't sell a lot of that model.
Software running under Wine is restricted to the current users privileges as such any Windows malware is contained in the current “bottle" under ~/.wine, and doesn't persist between reboots.
Of course none of this would matter if the software was cross-platform, which is how software was built a long time ago. If I recall correctly the one source code file would compile for different platforms depending on certain #pragma directives in the listing.
'Storage systems in several of IBM's European data centres have been down since the small hours, with engineers battling to fix an unspecified "network-related" problem'
Would these network-related problems be in the underlying software defined routers, switches and storage such that there's a tear in the cloud fabric?
> You mean the low-margin stuff that has forced other manufacturers out of the business? Sounds like a winner!
No, I meant high end stuff like the iPad, the iPhone and a high end set top box combined with services such as high-def movies and games piped directly into your living room. You sell them the boxes and then make even more money selling them services.
Additionally, if even Dell can't make money out of the IBM PC, what hope is there for the rest of us?
Why didn't Dell diversify into other markets such as mobile space, set top boxes, multimedia centers etc., such that they could ride out dips in the PC market.
Not to be confused with this one:
> why not simply have a 'foreach' ?
Because computer programming is an esoteric art form not to the shared with the hoi polloi :]
> For example, I present to everyone the GLM challenge. Who can find where the glm::mat4 glm::rotate() function is actually implemented in 1 minute?:
Interesting .. I've also wondered why, for such a high level language, you need to help C++ keep track of its variables using the Namespace feature. For another example, it's perfectly obvious that :: is the scope resolution operator and does different things depending on the context. It would be like creating a human language that the key words could be overloaded with ever changing meaning <sarcasm>
Human brains don't work like this, C++ a high level computer language written for computers :]
Biting the hand that feeds IT © 1998–2018