Cryptocurrency Scams Like Prodeum Are Just Straight-Up Trolling at This Point

US regulators and Facebook are finally coming for bogus...

Read More

Chrome Extension Malware Has Evolved

While helpful and creative, Chrome extensions have also become a new playground for hackers intent on stealing your data.

Read More
T-Mobile Blocks Pirate Sites Then Reports Itself For Possible Net Neutrality Violation
Jan31

T-Mobile Blocks Pirate Sites Then Reports Itself For Possible Net Neutrality Violation

For the past eight years, Austria has been struggling with the thorny issue of pirate site blocking. Local ISPs have put up quite a fight but site blocking is now a reality, albeit with a certain amount of confusion. After a dizzying route through the legal system, last November the Supreme Court finally ruled that The Pirate Bay and other “structurally-infringing” sites including 1337x.to and isohunt.to can be blocked, if...

Read More
10 tips for making the Django Admin more secure
Jan31

10 tips for making the Django Admin more secure

This article was co-written with Lacey Williams Henschel. Offloading the responsibility for making your app secure onto QA testers or an information security office is tempting, but security is everyone’s responsibility. The Django Admin is one of our favorite features of Django, but unless it’s locked down correctly, it presents opportunities for exploitation. To save your users from compromised data, here are 10 tips to...

Read More
A history of low-level Linux container runtimes
Jan31

A history of low-level Linux container runtimes

At Red Hat we like to say, “Containers are Linux—Linux is Containers.” Here is what this means. Traditional containers are processes on a system that usually have the following three characteristics: 1. Resource constraints When you run lots of containers on a system, you do not want to have any container monopolize the operating system, so we use resource constraints to control things like CPU, memory, network...

Read More