Aug 14, 2023 | Podcast
The Linux Foundation released a report on Open Source Maintainers. They interviewed some of the community’s most influential maintainers to understand more about how maintainers become maintainers, and to capture their experiences, observations and success...
Aug 11, 2023 | Podcast
How do you measure productivity of remote workers? For one company, productivity is measure by having more than 500 keystrokes on the computers every hour. In a rare case for Australia, an employee had been terminated for not meeting the required productivity levels....
Aug 10, 2023 | Podcast
How are malicious apps getting pass Google Play Store’s review process and their rigorous PHA (Potentially Harmful Application) screening? Well, they’re using a technique called versioning which is sneaky and hard to detect. The attackers would first...
Aug 9, 2023 | Podcast
Academic researchers from British universities have developed a deep learning side channel attack that can be used to steal data from keyboard strokes that are recorded using a microphone with an accuracy of 95%. The audio can be recorded from a nearby microphone, or...
Aug 8, 2023 | Podcast
A number of cybersecurity agencies have co-authored a joint Cybersecurity Advisory (CSA) on frequently exploited vulnerabilities in 2022. The advisory provided details on CVEs routinely and frequently exploited by cyber criminals. The agencies included: United States:...
Aug 7, 2023 | Podcast
Cyber criminals have scammed the Australian Tax Office of more than half a billion dollars. They have done so by exploiting a weakness in the identification system used by the myGov online portal. The weakness allows them to redirect other people’s tax refund to...