HUP cikkturkáló

"Egy gigabites internetet ad a Telekom"

"A Magyar Telekom friss közleménye szerint novembertől országszerte elérhetővé teszik lakossági, valamint vállalati ügyfeleik számára is az 1000 Mbps gyorsaságú vezetékes netet azokon a területeken, ahol már kiépítették az ehhez szükséges optikai hálózatot. Ez a lakosságra nézve azt jelenti, hogy ötszázezer háztartásban lehet előfizetni vagy váltani a NetMánia 1000 csomagra, ami névleg 1000 Mbit/s le- és 200 Mbit/s feltöltési sebességet kínál, 300 Mbit/s garantált le- és 50 Mbit/s feltöltési sebesség mellett."

További részletek itt.

"Stagefright - At this point we still don’t have any confirmed instances of exploitation in the wild"

As an example of Android’s misunderstood security, Ludwig used the infamous series of critical bugs known as Stagefright, which were found last year. Ludwig noted that despite the alarm and the potential danger to practically all Android users, they have yet to see a real-life hack on an Android phone done exploiting Stagefright.

“At this point we still don’t have any confirmed instances of exploitation in the wild,” he said.

[ Google Security Engineer Claims Android Is Now As Secure as the iPhone ]

New MacBook Pros and the State of the Mac

Michael Tsai’s Roundup of Commentary on the New MacBook Pros and the State of the Mac

Dozens and dozens of links here. Rather astounding how much backlash last week’s event has generated. I can’t recall an Apple event that generated such a negative reaction from hard-core Mac users. I’m working on a longer piece with my full thoughts on what’s going on, but for now, Tsai’s list of links is must-read stuff.

[ New MacBook Pros and the State of the Mac ]

AtomBombing: A Code Injection that Bypasses Current Security Solutions

Our research team has uncovered new way to leverage mechanisms of the underlying Windows operating system in order to inject malicious code. Threat actors can use this technique, which exists by design of the operating system, to bypass current security solutions that attempt to prevent infection. We named this technique AtomBombing based on the name of the underlying mechanism that this technique exploits.

AtomBombing affects all Windows version. In particular, we tested this against Windows 10.

Unfortunately, this issue cannot be patched since it doesn’t rely on broken or flawed code – rather on how these operating system mechanisms are designed

[ AtomBombing: A Code Injection that Bypasses Current Security Solutions ]