Day: August 10, 2019

Judges Begin Ruling Against Some Porn Purveyors’ Use of Copyright Lawsuits

Slashdot reader pgmrdlm quotes Bloomberg: Pornography producers and sellers account for the lion’s share of copyright-infringement lawsuits in the U.S. — and judges may have seen enough. The courts are cracking down on porn vendors that file thousands of lawsuits against people for downloading and trading racy films on home computers, using tactics a judge…


iPhone 11, 11R and 11 Max: The specs, features and prices we expect from Apple in September – CNET

With all the buzz about the 2020 iPhone, what exactly are we going to see this year? …read more Source:: CNet


SELECT code_execution FROM * USING SQLite: Eggheads lift the lid on database hi-jinks

You’ve heard of ROP? Now get a load of QOP DEF CON At the DEF CON hacking conference in Las Vegas on Saturday, infosec gurus from Check Point are scheduled to describe a technique for exploiting SQLite, a database used in applications across every major desktop and mobile operating system, to gain arbitrary code execution.……


DEF CON 2019: New Class of SQLite Exploits Open Door to iPhone Hack

Researchers exploit a SQLite memory corruption issue outside of a browser. …read more Source:: Threatpost


Top 10 security extensions for Google Chrome

These extensions will help you beef up security and keep your data out of the hands of hackers and other online criminals. …read more Source:: ZDNet


Was ‘The Matrix’ Part of Cinema’s Last Great Year?

In 2014 Esquire argued that great movies like The Matrix “predicted a revolution in film that never happened,” adding “We are in many ways worse off now than we were 15 years ago as a culture. We seem to have run out of original ideas.” This week two film critics debated whether 1999 was in…


Stepper-Controlled Chop Saw Automates a Tedious Job

We’re not going to question why [Absorber Of Light] needs to cut a bazillion little fragments of aluminum stock. We assume his reasoning is sound, so all we’re interested in is the automated chop saw he built to make the job less tedious, and potentially less finger-choppy. There are probably many ways to go about…


AMD Poses ‘Major Challenge’ to Intel’s Server Leadership

Rob Enderle reports on the excitement at AMD’s Epyc processor launch in San Francisco: I’ve been at a lot of AMD events, and up until this one, the general message was that AMD was almost as good as Intel but not as expensive. This year it is very different; Intel has stumbled badly, and AMD…


New Spectre-like CPU Vulnerability Bypasses Existing Defenses

itwbennett writes: Researchers from security firm Bitdefender discovered and reported a year ago a new CPU vulnerability that ‘abuses a system instruction called SWAPGS and can bypass mitigations put in place for previous speculative execution vulnerabilities like Spectre,’ writes Lucian Constantin for CSO. There are three attack scenarios involving SWAPGS, the most serious of which…


Can Swap Space Solve System Performance Issues?

Earlier this week on the Linux kernel mailing list, Artem S. Tashkinov described a low-memory scenario where “the system will stall hard. You will barely be able to move the mouse pointer. Your disk LED will be flashing incessantly…” “I’m afraid I have bad news for the people snickering at Linux here,” wrote Chris Siebenmann,…