More stories

  • in

    Google is trying to solve the software supply chain security problem

    Source: Google Building software is challenging work that takes a range of different tools, libraries and other components referred to as the ‘software supply chain’. Any weak link in that supply chain can lead to cyber breaches with major consequences — such as the 2020 SolarWinds breach that targeted a wide range of entities, including […] More

  • in

    What is torrenting and how does it work?

    BitTorrent uses its own special set of buzzwords to describe various aspects of how the system works. If you want to really understand what’s happening, it helps to understand what the terms mean.Seed: This is the machine that originally distributes the shared file. Technically, any peer that has 100% of the shared file also becomes a seed.Peer: This is a machine that downloads the shared file and then shares parts of the file to other peers. When you run a BitTorrent client on your machine to get a file, you’re running a peer.Piece: Part of a shared file, to be combined with other pieces when reassembled into a usable whole.Torrent: Torrent is used in two ways. When specified with the word file (as in “torrent file”), this is a file containing metadata describing all of the pieces of the shared file and its checksum (validation) data. When used on its own (as in “I downloaded a torrent of Ubuntu”), it means the shared file (and all its pieces).Swarm: This is the full network that’s sharing a file, consisting of all the peers and seeds.Tracker: This is a server that keeps track of the seeds and peers in the swarm. A tracker is often not involved in the actual transfer of data, but acts as more of an index or search engine for people looking for torrents. Trackers are often the target of legal action, because they’re seen as the enablers of illicit file sharing.Leech: This is a term for a peer that does not share pieces of a shared file. Basically, this is someone who wants to download a file using BitTorrent, but is not willing to do their part to support the swarm. Some leeches on very low-bandwidth connections can’t download and share, so they download first, then share. But most leeches simply choose to be a “bit piggy” and download files without giving back.Health: Do not confuse the BitTorrent term “health” with quality or safety of a file. In BitTorrent, health means how much of a file is available to download (anything less than 100% health means you’re not getting a full file today). Do not assume something that shows 100% health is, for example, free of viruses. This also spotlights one of the downfalls of torrenting: Not all files are fully available to download. You may have to wait until a peer shows up with the missing pieces or, for less popular files, you may never get those missing pieces.Fake: A file that spoofs what it claims to have. Generally, it’s a file that contains malware or just junk bytes, designed to either attack users or improve the uploader’s ratio.Ratio: This is a measure of how much you’ve uploaded. It is sometimes used by trackers to allow more access to more files.TOR: Folks often get confused by this. TOR stands for The Onion Router and is unrelated to BitTorrent. Because TOR is a way of communicating over the Internet anonymously, some people do run torrents over TOR. But the TOR Project and BitTorrent are completely separate beasts.Have I missed any important terms for torrents? If I did, let us know in the comments below. More

  • in

    This 'thermal attack' can read your password from the heat your fingertips leave behind

    A thermal image showing heat traces left by fingertips on a keyboard, which researchers say could be used to crack passwords. Image: University of Glasgow Computer security researchers say they’ve developed an AI-driven system that can guess computer and smartphone passwords in seconds by examining the heat signatures that fingertips leave on keyboards and screens […] More

  • in

    The best Ring & Blink deals ahead of October Prime Day

    Current price: $69Original price: $99This is Ring’s most popular video doorbell: the 2020-release, battery-operated model. Featuring 1080p HD video, Alexa voice control, two-way talk, night vision, and advanced motion detection, this video doorbell is at the lowest price we’ve ever seen it before — even lower than during Amazon’s July Prime Day Sale.The built-in rechargeable battery makes for an easy installation, since there is no wiring involved, making it a perfect fit for anyone looking to upgrade their current doorbell setup. However, if you prefer a wired installation, this doorbell is also equipped for installation using your existing doorbell’s wiring.  More

  • in

    Facebook users warned: You may have downloaded these password-stealing Android and iOS apps

    Image: Getty/Enes Evren Tech giant Meta said it has notified a million Facebook users that their usernames and passwords might have been stolen after downloading one of over 400 malicious Android and iOS smartphone apps.  The apps were discovered in the Google Play Store and Apple’s App Store over the course of the last year, […] More

  • in

    NSA, FBI warning: Beware these 20 software flaws most used by hackers

    Image: Getty/Deagreez The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) have listed the top 20 software flaws that China-funded hackers have been using to compromise networks since 2020.  The advisory emphasizes that China-backed hackers actively target not just the networks of the US government and its […] More