Confidential Samsung data leaked in a massive breach.

Confidential Samsung data leaked in a massive breach, this includes the content below. DEVICES/HARDWARE -Source code for every Trusted Applet (TA) installed on all Samsung device’s TrustZone (TEE) with specific code for every type of TEE OS (QSEE, TEEGris etc) THIS INCLUDES DRM MODULES AND KEYMASTER/GATEKEEPER! -Algorithms for all biometric unlock operations, including source code … Read more

Twitch website database contents and software leaked by a malicious agent.

The databases and internal software of the Twitch video streaming platform have been leaked on the Internet. Twitch is an American video live streaming service that focuses on video game live streaming, including broadcasts of esports competitions, operated by Twitch Interactive, a subsidiary of Amazon.com, Inc. This leak includes the following. Entirety of twitch.tv, with … Read more

500 million LinkedIn users’ data is for sale on a hacker site

The account data of 500 million users of the social networking website LinkedIn is for sale on a hacker`s website. This goes to show that you cannot trust any website with your details if they have poor OPSEC. You are better off networking by meeting with others at trade shows and exhibitions. There you may … Read more

Leaked Intel files contain Intel Management Engine information and Linux test utilities.

The leaked Intel files contain a lot of information about the Intel Management Engine as well as a few Linux test utilities and source code. This is very interesting, I wonder how this was leaked. But the company`s image might be tainted by this leak, I mean how did it occur and how much damage … Read more

How to read ID3 data from an MP3 file on Linux with the command line.

Reading ID3 data from an MP3 file on Linux is very easy with the ffmpeg suite. The ffprobe command can do this very easily. This example will return the title and artist of the MP3 file. 4.4 Mon Mar 02 jason@Yog-Sothoth 0: $ ffprobe -loglevel quiet -show_entries format_tags=artist,title 02\ Snake\ Hips.mp3 [FORMAT] TAG:title=Snake Hips TAG:artist=The … Read more

A Data Warehousing solution using SQL Server

I have been researching a system for deploying a database cluster. I have chosen the Microsoft SQL Server product. This does support server clustering and uses nodes clustered together on a network to create a failover network that will automatically maintain operation if one node is to fail. A virtual network of database nodes spread … Read more

Discussion of virtualization and database servers.

I have been researching a system for deploying a database cluster. I have chosen the Microsoft SQL Server product. This does support server clustering and uses nodes clustered together on a network to create a failover network that will automatically maintain operation if one node is to fail. A virtual network of database nodes spread … Read more

Theresa May to make encryption and free software illegal in the UK.

Theresa May is trying to make encryption illegal in the UK. She wants Content Service Providers to use Deep Packet Inspection to analyze the data sent over provider networks using probes embedded in the packet flow over the network. The Home Office seemed confident that this was technically possible. Other witnesses questioned whether it is … Read more

Mandatory data retention laws passed the senate this week.

Mandatory data retention laws passed the senate this week. The premise is to fight against Islamic terrorist attacks by retention of ISP customer data. But this will not work out right from the start. ISP`s are confused by the 400 page document that outlines what they must retain, and they are not ready to capture … Read more