Password Manager LastPass Suffers Hacking Attack

by Jeff Martin on  Jun 17, 2015

The web-based LastPass password management service has been hacked according to the company, and the result is that some user data, including email addresses and authentication hashes were obtained by unknown assailants. The breach highlights the risks users take by storing all of their passwords in a centralized location.

SQL Server 2016: Row-Level Security

by Jonathan Allen on  Jun 17, 2015

A common criticism for SQL Server’s security model is that it only understands tables and columns. If you want to apply security rules on a row-by-row basis, you have to simulate it using stored procedures or table value functions, and then find a way to make sure there is no way to bypass them. With SQL Server 2016, that is no longer a problem.

SQL Server 2016: Always Encrypted

by Jonathan Allen on  Jun 16, 2015 4

SQL Server 2016 seeks to make encryption easier via its new Always Encrypted feature. This feature offers a way to ensure that the database never sees unencrypted values without the need to rewrite the application.

GitHub Revoked Compromised and Unsecure SSH Keys

by Sergio De Simone on  Jun 11, 2015

GitHub has recently started revoking SSH keys that were deemed to be compromised or otherwise insecure. Systems engineer Ben Cartwright-Cox was the author of the research that uncovered the issues. InfoQ has spoken with him.

Microsoft Recommits to Providing SSH for Windows

by Jeff Martin on  Jun 04, 2015 1

The third time may be the charm as Microsoft has announced intentions to produce native SSH client and server tools for the Windows platform. Using OpenSSH as a starting point, Microsoft says their goals for the new toolset includes easier system management of both Windows and Linux systems.

Meeting Regulatory Demands with Agile Software Development

by Ben Linders on  Jun 04, 2015 1

InfoQ interviewed Jan van Moll about regulatory demands for software in healthcare, satisfying these demands with waterfall project or with a mix of waterfall and agile, and introducing agile in an R&D organization that needs to fulfill regulatory demands.

Google Introduces Smart Lock for Passwords

by Abel Avram on  Jun 02, 2015

Google has announced at I/O 2015 the Google Identity Platform, a collection of tools and APIs for managing identities and dealing with authentication and authorization across Android, iOS and web applications.

Security Vulnerabilities in Docker Hub Images

by Chris Swan on  May 29, 2015 2

BanyanOps have published a report stating that ‘Over 30% of Official Images in Docker Hub Contain High Priority Security Vulnerabilities’, which include some of the sensational 2014 issues such as ShellShock and Heartbleed. The analysis also looks at user generated ‘general’ repositories and finds an even greater level of vulnerability.

Delivering Value on Time by Using #NoEstimates

by Ben Linders on  May 21, 2015 2

Vasco Duarte suggests that people should experiment with #NoEstimates to learn and find ways in which it can help them to deliver value on time and under budget. He is writing a book on #NoEstimates in which he explains why estimation does not work and how you can use #NoEstimates to manage projects.

Netflix's FIDO Guards Against Security Incidents

by James Chesters on  May 19, 2015

The Netflix team has released FIDO -- an open source system for automatically analysing security events. Not to be confused with FIDO Alliance, Netflix's platform stands for Fully Integrated Defense Operation, the platform's Github describes FIDO as "an orchestration layer used to automate the incident response process by evaluating, assessing and responding to malware."

VENOM Vulnerability Threatens Several Major VM Hosts

by Jeff Martin on  May 19, 2015

Users of the popular virtual machine tools Xen, KVM, VirtualBox, and QEMU are urged to patch their systems as soon as possible due to a newly found bug that exposes flaws in the code providing virtual floppy disk support. The VENOM vulnerability affects all operating systems that are hosting these environments.

Docker Security Benchmark

by Chris Swan on  May 08, 2015

Docker Inc have worked with the Center for Internet Security (CIS) to produce a benchmark document containing numerous recommendations for the security of Docker deployments. The benchmark was announced in a blog post ‘Understanding Docker Security and Best Practices’ by Diogo Mónica who was recently hired along with Nathan McCauley to lead the Docker Security team.

Spring Security 4.0: WebSocket, Spring Data and Test Support

by Matt Raible on  Apr 21, 2015

The Spring Security team released Spring Security 4.0.0, adding several new features as well as more default security. Major themes include WebSocket Security, Spring Data integration, better testing support and the introduction of Spring Session as a new (Apache licensed) open source project.

Atlassian’s Stash Data Center Offers High Availability and Scalability for Git

by Steffen Opel on  Apr 15, 2015 1

Atlassian recently released Stash Data Center, a highly available and horizontally scalable deployment option for its on-premises source code and Git repository management solution Stash. New nodes can be added without downtime to provide active-active clustering and instant scalability.

Chrome 42 Disables NPAPI and Related Plug-ins: Java, Unity, Silverlight

by Abel Avram on  Apr 15, 2015 5

As outlined in the NPAPI Deprecation Guide, Chrome 42, which was due this month and was recently released to the stable channel, has disabled support for the Netscape Plug-in API. The reason is that NPAPI “has become a leading cause of hangs, crashes, security incidents, and code complexity” and the intent was first announced in 2013.

General Feedback
Marketing and all content copyright © 2006-2015 C4Media Inc. hosted at Contegix, the best ISP we've ever worked with.
Privacy policy