A new vulnerability has been discovered that makes it possible to get a privilegded process to core dump in a restricted area.
This can via a few nifty tricks be abused to gain root access to a linux system
What happens if you put a funky format string as SSID for your wifi AP? For IPhones it can have an unexpected outcome.
Have you ever shared a picture of your Danish social security card (in Danish: sundhedskortet) online? Maybe with a finger across to cover the secret number?
Think you’re safe from identify theft? probably not!
If you want to have extra security for your linux machine besides the usual password. Then get yourself a SoloKey or other hardware U2F key and use that as secondary login. Here I give you the description on how to install and configure everything for using Solokeys with your linux. Enjoy!
I spend a lot of my time on IT security and related subjects. This is also why you will always find at least 1-2 hardware security keys on me when I move around. This time I tell a bit about the three types I primarily use.
Sometimes you need a lot of storage in the cloud and services like dropbox and google drive just don’t give you enough space (unless you pay a lot of money each month). I have been looking a bit at the 1TB+ cloud services and found my favorite among them.