Louvre Jewel Heist Security I assume I don’t have to explain last week’s Louvre… rooter October 27, 2025 2 min read 0
First Wap: A Surveillance Computer You’ve Never Heard Of Security Mother Jones has a long article on surveillance arms manufacturers,… rooter October 27, 2025 2 min read 0
How We (Almost) Found Chromium’s Bug via Crash Reports to Report URI Security Presently sponsored by: Report URI: Guarding you from rogue JavaScript!… rooter October 27, 2025 3 min read 0
Weekly Update 475 Security Presently sponsored by: Report URI: Guarding you from rogue JavaScript!… rooter October 25, 2025 2 min read 0
Friday Squid Blogging: “El Pulpo The Squid” Security There is a new cigar named “El Pulpo The Squid.”… rooter October 24, 2025 1 min read 0
Part Four of The Kryptos Sculpture Security Two people found the solution. They used the power of… rooter October 24, 2025 1 min read 0
Serious F5 Breach Security This is bad: F5, a Seattle-based maker of networking software,… rooter October 23, 2025 2 min read 0
AWS Outage: Lessons Learned Security What can we learn from the recent AWS outage, and… rooter October 21, 2025 13 min read 0
AWS Outage: Lessons Learned Security What can we learn from the recent AWS outage, and… rooter October 21, 2025 13 min read 0
Inside the Synthient Threat Data Security Presently sponsored by: Report URI: Guarding you from rogue JavaScript!… rooter October 21, 2025 10 min read 0