Medical device vulnerability could let hackers steal Wi-Fi credentials
A vulnerability found in an interaction between a Wi-Fi-enabled battery system and an infusion pump for the delivery of medication could provide bad actors with...
CVE-2020-10735
A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse...
python3.9-3.9.14-1.fc37
FEDORA-2022-6d57598a23 Packages in this update: python3.9-3.9.14-1.fc37 Update description: Update to 3.8.14 Contains security fix for CVE-2020-10735 Read More
python3.9-3.9.14-1.fc36
FEDORA-2022-46a44a7f83 Packages in this update: python3.9-3.9.14-1.fc36 Update description: Update to 3.8.14 Contains security fix for CVE-2020-10735 Read More
Responsible Disclosure for Cryptocurrency Security
Stewart Baker discusses why the industry-norm responsible disclosure for software vulnerabilities fails for cryptocurrency software. Why can’t the cryptocurrency industry solve the problem the way...
Transacting in Person with Strangers from the Internet
Communities like Craigslist, OfferUp, Facebook Marketplace and others are great for finding low- or no-cost stuff that one can pick up directly from a nearby...
python3-docs-3.10.7-1.fc35 python3.10-3.10.7-1.fc35
FEDORA-2022-ac82a548df Packages in this update: python3.10-3.10.7-1.fc35 python3-docs-3.10.7-1.fc35 Update description: Update to 3.10.7 Contains security fix for CVE-2020-10735 Read More
python3.10-3.10.7-1.fc37
FEDORA-2022-f330bbfda2 Packages in this update: python3.10-3.10.7-1.fc37 Update description: Update to 3.10.7 Contains security fix for CVE-2020-10735 Don't use custom installation schemes. Read More
Our Statement of Condolence – Queen Elizabeth II – 1952 – 2022
We are deeply saddened by the passing of Her Majesty Queen Elizabeth II. We send our sincerest condolences to the Royal Family. Read More
Cybersecurity Snapshot: 6 Things That Matter Right Now
Topics that are top of mind for the week ending Sept. 9 | Software supply chain security in the spotlight. Guidance for evaluating IoT security...