There is a huge disconnect today in the way we teach computer science to students who wish to become software engineers, and what the industry expects of them when they graduate.
Oracle security chief to customers: Stop checking our code for vulnerabilitiesOracle's chief security officer is tired of customers performing their own security tests on Oracle software, and she's not going to take it anymore. That was the message of a post she made to her corporate blog on August 10—a post that has since been taken down.
We’re struggling to get traction with SSL because it’s still a “premium service”The web is going HTTPS only. In theory. The idea is that unless we encrypt all the transport things, we can have no confidence in the confidentiality, integrity or authenticity of the traffic and services we’re talking to.
Oracle blogger: No, you can't look at our code.Oracle blogger: No, you can't look at our code. (blogs.oracle.com) What an arrogance! They run their software on BILLIONS of devices and new vulnerabilities are discovered nearly daily, wether they want it or not.
9 Things I Learned as a Software EngineerThis post was written by Manuel Ebert. It was first published on Medium, and has been reposted here with his permission. You can follow Manuel on Twitter or on Medium.
The technology behind preview photosFirst impressions matter, whether you're on a first date, in a job interview, or just choosing new decorations for your house. Some of the first things you see when you visit someone's profile or page on Facebook are the pictures.
This Hacker's Tiny Device Unlocks Cars And Opens GaragesThe next time you press your wireless key fob to unlock your car, if you find that it doesn’t beep until the second try, the issue may not be a technical glitch. Instead, a hacker like Samy Kamkar may be using a clever radio hack to intercept and record your wireless key’s command.
Router redirecting to unwanted Adobe Flash update malware site - Moon Virus?Bear with me, for now this will be a tiny post, a placeholder, but I am looking for feedback, ideas, comments and I will keep this post updated.
Welcome to The Internet of Compromised ThingsEvery time you use WiFi, ask yourself: could I be connecting to the Internet through a compromised router with malware? It's becoming more and more common to see malware installed not at the server, desktop, laptop, or smartphone level, but at the router level.
You Wouldn't Base64 a Password - Cryptography Decoded - Paragon InitiativeThis Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.
This list is compiled from my Pocket list.