Weekend Reads 080620

Due to the increasing use of extensions that block third-party tracking, tracking providers introduced a new technique called Canonical Name (CNAME) cloaking.

And the ugly truth is that you’ve become addicted to arguing with the “End Is Nigh” sandwich board guy. The guy you used to quietly skirt, you now seek him out and you bring your friends and for some idiotic reason you think that if you just post a little bit more you’re going to get him to see reason. Or put him in his place.

On July 27, two companies — open source project management firm Snyk and development services firm xs:code — announced they have teamed up to provide a browser plug-in that will give developers important metrics by which to gauge the security of open source projects.

In any case, many of us are now living at work. And living at work means you have a new responsibility to your coworkers and clients: how you sound, how you look, and the visual appeal of your workspace is now your problem. You may feel that this isn’t your responsibility, but your home is now your office.

Modern applications, and the cloud platforms upon which they are built, need to be designed and continuously validated for failure. Developers need to account for known and unknown failure conditions, applications and services must be architected for redundancy, algorithms need retry and back-off mechanisms.

On July 28, the FBI revealed in Flash Alert MI-000130-MW that it had received notifications of attacks involving Netwalker against U.S. and foreign government organizations along with entities operating in the healthcare and education sectors.

Probability Distributions play an important role in our daily lives. We commonly use them when trying to summarise and gain insights from different forms of data.

Cybersecurity researchers have discovered critical vulnerabilities in industrial VPN implementations primarily used to provide remote access to operational technology (OT) networks that could allow hackers to overwrite data, execute malicious code, and compromise industrial control systems (ICS).

It’s important for Westerners such as myself to remember that most of the world did not first interact with the Internet via desktop computer. In most emerging markets, people leapfrogged computers altogether on their way to using mobile apps.

The majority of significant threats we face today have been around for years, even centuries (for example, fake news via propaganda, demands for ransom, data compromise), and while we may see something new, it’s more likely that current attacks will continue to be refined, growing in sophistication to focus on what penetrates defenses best.