- 10 Ad Blocking Extensions Tested for Best Performance — This test is about the performance of an ad blocker in terms of how quickly it loads a range of ad blocked pages, the maximum amount of memory it uses, and how much stress it puts on the CPU. µBlock Origin wins for Chrome. (via Nelson Minar)
- Staff Evaluation of Me (Karl Fisch) — I also tried the Google Form approach. 0 responses, from which I concluded that nobody had any problems with me and DEFINITELY no conclusions could be drawn about my coworkers creating mail filters to mark my messages as spam.
- Blockchain (BBC) — episode on the blockchain that does a good job of staying accurate while being comprehensible. (via Sam Kinsley)
- Fingerprints On Mobile Devices: Abusing and Leaking (PDF) — We will analyze the mobile fingerprint authentication and authorization frameworks, and discuss several security pitfalls of the current designs, including: Confused Authorization Attack; Unsecure fingerprint data storage; Trusted fingerprint sensors exposed to the untrusted world; Backdoor of pre-embedding fingerprints.
Four core questions that every security team must ask itself to develop its strategy in dealing with attacks.
Massive software vulnerabilities have been surfacing with increasingly high visibility, and the world’s computer administrators are repeatedly thrust into the cycle of confusion, anxiety, patching and waiting for the Next Big One. The list of high profile vulnerabilities in widely used software packages and platforms continues to rise. A recent phenomenon has researchers borrowing from the National Hurricane Center’s tradition, to introduce a vulnerability with a formal name. Similar to hurricanes and weather scientists, security researchers, analysts, and practitioners observe and track vulnerabilities as more details unfold and the true extent of the risk (and subsequent damage) is known.
Take for example the Android vulnerability released at the beginning of August, 20151. This vulnerability, named “Stagefright” after its eponymous application, can lead to remote code execution (RCE) through several vectors including MMS, Email, HTTP, Media applications, Bluetooth, and more. These factors coupled with the fact that at its release there were no approved patches available for upwards of 95% of the world’s mobile Android footprint means the vulnerability is serious — especially to any organization with a significant Android population.
A look at our unified program for unified creators.
Register now for Solid Amsterdam 2015, our conference exploring the intersections of manufacturing, design, hardware, software, and business strategy. The event will take place in Amsterdam on October 28, 2015.
Creating a great product means knowing something about many things: design, prototyping, electronics, software, manufacturing, marketing, and business strategy. That’s the blend that Solid brings together: over our one-day program at Solid Amsterdam on October 28, 2015, we’ll walk through a range of inspiration and insight that’s essential for anyone who creates physical products — consumer devices, industrial machines, and everything in between.
Start with design: it’s the first discipline that’s called on to master any new technology, and designers whose work has been confined to the digital realm are now expected to understand hardware and connected systems as well.
Design at Solid begins with our program co-chair, Marko Ahtisaari, who was head of product design at Nokia from 2009 to 2013, and is now CEO and co-founder of The Sync Project. We’ll also hear from Thomas Widdershoven, creative director at Design Academy Eindhoven and co-founder of thonik, a design studio whose work specializes in interaction and motion design. Read more…