How COVID-19 Has Changed Business Cybersecurity Priorities Forever

For much of this year, IT professionals all over the globe have had their hands full, finding ways to help businesses cope with the fallout of the coronavirus (COVID-19) pandemic. In many cases, it involved a rapid rollout of significant remote work infrastructure. That infrastructure was called into service with little to no warning and …

Read moreHow COVID-19 Has Changed Business Cybersecurity Priorities Forever

SpaceX launches 57 more Starlink satellites, lands rocket at sea

CAPE CANAVERAL, Fla. — SpaceX successfully launched dozens of Starlink internet satellites and two small Earth-imaging satellites into orbit Friday (Aug. 7) in the second of what’s expected to be a series of Starlink rideshare missions. A two-stage Falcon 9 rocket carrying 57 SpaceX Starlink satellites, along with two BlackSky Global Earth-observation satellites, lifted off …

Read moreSpaceX launches 57 more Starlink satellites, lands rocket at sea

Intel, ARM, IBM, AMD Processors Vulnerable to New Side-Channel Attacks

It turns out that the root cause behind several previously disclosed speculative execution attacks against modern processors, such as Meltdown and Foreshadow, was misattributed to ‘prefetching effect,’ resulting in hardware vendors releasing incomplete mitigations and countermeasures. Sharing its findings with The Hacker News, a group of academics from the Graz University of Technology and CISPA …

Read moreIntel, ARM, IBM, AMD Processors Vulnerable to New Side-Channel Attacks

The 308 SCA Semi-Caseless Ammunition by Wild Arms Research and Development

Since the dawn of firearms, mankind has always sought to reduce the weight of the load on the bearer of the weapon. Caseless ammunition was a major step in this direction beginning in 1848 by Walter Hunt and his “Rocket Ball” ammo. Jonathan at Wild Arms Research & Development (WARD) has taken another crack at …

Read moreThe 308 SCA Semi-Caseless Ammunition by Wild Arms Research and Development

New Hyperledger Fabric Training Course Prepares Developers to Create Enterprise Blockchain Applications

The Linux Foundation, the nonprofit organization enabling mass innovation through open source, today announced the availability of a new training course, LFD272 – Hyperledger Fabric for Developers. LFD272, developed in conjunction with Hyperledger, is designed for developers who want to master Hyperledger Fabric chaincode – Fabric’s smart contracts – and application development.  

TARS: Contributing to an open source microservices ecosystem

Linux Foundation Executive Director Jim Zemlin recently spoke at Cloud Native + Open Source Virtual Summit China 2020. We’d now like to republish his opening comments and a guide on how to get involved with the TARS project, the open source microservices framework. The pandemic has thrown our global society into a health and economic …

Read moreTARS: Contributing to an open source microservices ecosystem

TFB Review: Pulsar Trail 2 LRF XP50 Thermal Imaging Riflescope

Earlier this year we gave you a head’s up about the new upcoming products from Pulsar Thermal Imaging. Time flies and I’ve had the opportunity to examine and use both the Pulsar Accolade 2 LRF XP50 thermal binoculars and the Pulsar Trail 2 LRF XP50 thermal riflescope for a few months. This review will cover the …

Read moreTFB Review: Pulsar Trail 2 LRF XP50 Thermal Imaging Riflescope

Space roar: NASA detected the loudest sound in the universe, but what is it?

In space, nobody can hear you scream, but with the right equipment, it is possible to detect a roar. That’s what scientists discovered back in 2006 when they began to look for distant signals in the universe using a complex instrument fixed to a huge balloon that was sent to space. The instrument was able …

Read moreSpace roar: NASA detected the loudest sound in the universe, but what is it?

Researcher Demonstrates 4 New Variants of HTTP Request Smuggling Attack

A new research has identified four new variants of HTTP request smuggling attacks that work against various commercial off-the-shelf web servers and HTTP proxy servers. Amit Klein, VP of Security Research at SafeBreach who presented the findings today at the Black Hat security conference, said that the attacks highlight how web servers and HTTP proxy …

Read moreResearcher Demonstrates 4 New Variants of HTTP Request Smuggling Attack

Genki’s Covert Dock is the perfect dock for the Nintendo Switch — and other gadgets, too

The Nintendo Switch’s ability to quickly transition from portable to home console is definitely one of its major selling points, but Nintendo’s official dock never really made much sense with the portable nature of the Switch itself. Luckily, third-party accessory maker Genki created the Covert Dock, a device no larger than a smartphone USB charger …

Read moreGenki’s Covert Dock is the perfect dock for the Nintendo Switch — and other gadgets, too