Full Fibre ISP Start-up toob Secure £75m Investment for UK Rollout

A new Portsmouth-based ISP called toob, which we reported last month had been established by several of Vodafone’s former directors and planned to roll-out a 900Mbps capable Fibre-to-the-Home (FTTH) broadband network to 100,000 UK premises by the end of 2021 (here), has secured a huge investment of £75m. The funding itself stems from the Amber …

Full Fibre ISP Start-up toob Secure £75m Investment for UK Rollout Read More »

Seven Social Media Scams to Avoid | Avast

Thieves no longer stop at credit card numbers and financial swindling. Sure, they want your money, but today’s career criminals want more. They want your data. Source:: Avast

6000 Musselburgh Premises to Get Virgin Media Ultrafast Broadband

National UK cable ISP Virgin Media has confirmed that their soon-to-be 500Mbps capable ultrafast broadband and TV network is about to be rolled out to cover 6,000 premises in Musselburgh, which is the largest coastal settlement within the East Lothian (Scotland) area and home to about 21,000 people. Back in 2016 Virgin Media announced that …

6000 Musselburgh Premises to Get Virgin Media Ultrafast Broadband Read More »

SQLite FTS5 Prefix Queries Heap-based Buffer Over-Read Vulnerability

A vulnerability in SQLite could allow an authenticated, remote attacker to access sensitive information on a targeted system. The vulnerability is due to a heap-based buffer over-read condition that could occur in the affected software when the FTS5 extension is enabled. An attacker could exploit this vulnerability by executing prefix queries within a transaction that …

SQLite FTS5 Prefix Queries Heap-based Buffer Over-Read Vulnerability Read More »

Artifex Software Ghostscript superexec -dSAFER Security Bypass Vulnerability

A vulnerability in Artifex Software Ghostscript could allow an unauthenticated, remote attacker to bypass security restrictions on a targeted system. The vulnerability exists because the superexec operator is available in the internal dictionary of the affected software. An attacker could exploit this vulnerability by persuading a user to open a crafted PostScript file that submits …

Artifex Software Ghostscript superexec -dSAFER Security Bypass Vulnerability Read More »

Artifex Software Ghostscript DefineResource dSAFER Security Bypass Vulnerability

A vulnerability in Artifex Software Ghostscript could allow an unauthenticated, remote attacker to bypass security restrictions on a targeted system. The vulnerability exists because the forceput operator could be extracted from the DefineResource method of the affected software. An attacker could exploit this vulnerability by persuading a user to open a crafted PostScript file that …

Artifex Software Ghostscript DefineResource dSAFER Security Bypass Vulnerability Read More »

Moodle edit_blog.php Server-Side Request Forgery Vulnerability

A vulnerability in the edit_blog.php script of Moodle could allow an authenticated, remote attacker to perform a server-side request forgery (SSRF) attack on a targeted system. The vulnerability is due to an input validation flaw in the edit_blog.php script when GET requests are performed. An attacker could exploit this vulnerability by supplying crafted GET requests, …

Moodle edit_blog.php Server-Side Request Forgery Vulnerability Read More »

Tuxera NTFS-3G Heap-based Buffer Overflow Privilege Escalation Vulnerability

A vulnerability in Tuxera NTFS-3G could allow a local attacker to gain elevated privileges on a targeted system. The vulnerability is due to insufficient size checks by the affected software because the getcwd() function uses an unsigned integer argument. An attacker could exploit this vulnerability by executing an application that submits malicious input to the …

Tuxera NTFS-3G Heap-based Buffer Overflow Privilege Escalation Vulnerability Read More »

Snapcore snapd seccomp Filter Strict Mode Security Bypass Vulnerability

A vulnerability in the Snapcore snapd daemon could allow a local attacker to bypass security restrictions on a targeted system. The vulnerability is due to improper security restrictions imposed on the seccomp filter used by the affected software on systems with 64-bit architectures. An attacker could exploit this vulnerability by bypassing access restrictions to insert …

Snapcore snapd seccomp Filter Strict Mode Security Bypass Vulnerability Read More »

Amazon Transcribe now supports speech-to-text in German and Korean

Amazon Transcribe is an automatic speech recognition (ASR) service that makes it easy for you to add a speech-to-text capability to your applications. Amazon Transcribe now supports transcription of audio in the following new languages: German and Korean. These languages expand upon the existing languages already available in Amazon Transcribe: US English, British English, Australian …

Amazon Transcribe now supports speech-to-text in German and Korean Read More »

Generate Fleet Metrics with New Capabilities of AWS IoT Device Management

AWS IoT Device Management is a service that allows you to onboard, organize, monitor, and remotely manage connected devices at scale. Within AWS IoT Device Management, fleet indexing allows you to index the Registry, Device Shadow, and connection state for every device in your fleet, as well as search for devices based on any combination …

Generate Fleet Metrics with New Capabilities of AWS IoT Device Management Read More »

Amazon Kinesis Data Analytics Supports AWS CloudTrail Logging

Amazon Kinesis Data Analytics is now integrated with AWS CloudTrail. AWS CloudTrail captures changes made to your Amazon Kinesis Data Analytics applications and delivers the log files to an Amazon S3 bucket you specify. Customers can now get visibility into their Amazon Kinesis Data Analytics application modifications including creation, deletion, and updates. Source:: Amazon AWS

Bloody B975 review: The optical switches impress even if the ‘edgy’ aesthetic doesn’t

Optical keyboards entered the mainstream last year with Razer’s Huntsman Elite. But as I noted at the time, Razer was far from the first company to explore optical keyboard switches. A few years back I started noticing a company called “Bloody” showing up at every trade show, fronting huge booths full of keyboards—ones equipped with …

Bloody B975 review: The optical switches impress even if the ‘edgy’ aesthetic doesn’t Read More »