Tag Archives: Features

In a first, cryptographic keys protecting SSH connections stolen in new attack

Getty Images reader comments 71 with For the first time, researchers have demonstrated that a large portion of cryptographic keys used to protect data in computer-to-server SSH traffic are vulnerable to complete compromise when naturally occurring computational errors occur while the connection is being established. Underscoring the importance of their discovery, the researchers used their… Read More »

The Signal Protocol used by 1+ billion people is getting a post-quantum makeover

Aurich Lawson | Getty Images reader comments 53 with The Signal Foundation, maker of the Signal Protocol that encrypts messages sent by more than a billion people, has rolled out an update designed to prepare for a very real prospect that’s never far from the thoughts of just about every security engineer on the planet:… Read More »

Barracuda thought it drove 0-day hackers out of customers’ networks. It was wrong.

reader comments 31 with In late May, researchers drove out a team of China state hackers who over the previous seven months had exploited a critical vulnerability that gave them backdoors into the networks of a who’s who of sensitive organizations. Barracuda, the security vendor whose Email Security Gateway was being exploited, had deployed a… Read More »

Windows feature that resets system clocks based on random data is wreaking havoc

reader comments 129 with A few months ago, an engineer in a data center in Norway encountered some perplexing errors that caused a Windows server to suddenly reset its system clock to 55 days in the future. The engineer relied on the server to maintain a routing table that tracked cell phone numbers in real… Read More »

Next-gen OSDP was supposed to make it harder to break in to secure facilities. It failed.

Getty Images reader comments 27 with Researchers have discovered a suite of vulnerabilities that largely break a next-generation protocol that was designed to prevent the hacking of access control systems used at secure facilities on US military bases and buildings belonging to federal, state, and local governments and private organizations. The next-generation mechanism, known as… Read More »

How we host Ars, the finale and the 64-bit future

Aurich Lawson | Getty Images reader comments 28 with Hosting Ars View more stories Greetings, dear readers, and congratulations—we’ve reached the end of our four-part series on how Ars Technica is hosted in the cloud, and it has been a journey. We’ve gone through our infrastructure, our application stack, and our CI/CD strategy (that’s “continuous… Read More »

Hosting Ars, part three: CI/CD, or how I learned to stop worrying and love DevOps

Enlarge / DevOps, DevOps, DevOps! ArtemisDiana / Getty Images reader comments 19 with Hosting Ars View more stories One of the most important things to happen in the evolution of development over the past many years is the widespread adoption of continuous integration and continuous deployment, or CI/CD. (Sometimes the “CD” stands for “continuous delivery,”… Read More »

How we host Ars Technica in the cloud, part two: The software

Enlarge / Welcome aboard the orbital HQ, readers! Aurich Lawson | Getty Images reader comments 3 with Hosting Ars View more stories Welcome back to our series on how Ars Technica is hosted and run! Last week, in part one, we cracked open the (virtual) doors to peek inside the Ars (virtual) data center. We… Read More »

The IBM mainframe: How it runs and why it survives

Enlarge / A Z16 Mainframe. reader comments 8 with Mainframe computers are often seen as ancient machines—practically dinosaurs. But mainframes, which are purpose-built to process enormous amounts of data, are still extremely relevant today. If they’re dinosaurs, they’re T-Rexes, and desktops and server computers are puny mammals to be trodden underfoot. It’s estimated that there… Read More »

The ‘90s Internet: When 20 hours online triggered an email from my ISP’s president

Banj Edwards | Aurich Lawson | Getty Images reader comments 112 with “When checking the system this morning, I noticed your account logged in for over 20 hours,” begins a December 1998 email from the president of my dial-up Internet service provider (ISP) at the time. “Our service is unlimited, but we ask that you… Read More »