Video: General Data Protection Regulation (GDRP) – The law that lets Europeans take back their data from big tech companies

/
Tech companies' reign over users' personal data has run largely unchecked in the age of the internet. Europe is seeking to end that with a new law

Mitigating Buffer Overflow Attacks in Linux/Unix

/
A buffer overflow is the most common and the most serious threat to Linux/Unix operating systems. Buffer overflows occur when code running in unprotected memory in a buffer overwrites memory in an adjacent location.

Mac OS X Security Keychain

/
The keychain is a secure database store for passwords and certificates and is created for each user account on Mac OS X. The system software itself uses keychains for secure storage.

SSD Encryption from Crucial and Samsung is not secure Exposes Data

/
The researchers examined multiple SSDs, including Crucial and Samsung, some of which they found could be unlocked with any password if the password validation routine in RAM was modified through a standard JTAG debugging interface.

Information Commissioner Calls for Regulation of Social Media Following Cambridge Analytica scandal

/
Information commissioner calls for regulation of social media following Cambridge Analytica scandal

Ruby2.3 Security Update – CVE-2018-16395 CVE-2018-16396

/
Several vulnerabilities have been discovered in the interpreter for the Ruby language. The Common Vulnerabilities and Exposures project identifies the following problems: