Oh look, more security articles today! First, HotHardware reports on a rootkit exploit in Intel processors that has existed since 1997. It is research based, so it does not sound like it has been used in the wild. On Bits Please they talk about a TrustZone exploit for Qualcomm. This has already been fixed, so any mobiles using those chips should already be protected. BinaryEdge gives us some scary information about data security for publicly available data sources. A lot of people expose their database to the world, and use the sometimes terrible security defaults. In particular, this article looks at Redis, MongoDB, Memcache and ElasticSearch.
As always, enjoy today’s items, and please participate in the discussions on these sites.
Startups, Career and Process
- Reasons for Continuous Planning | Johanna Rothman
Design and Development
- C++ STL vector: custom allocator, debugging iterators | Sergei Danielian
- Git becomes version-control’s lingua franca wire protocol | Paul Hammant
- JavaScript Debugging Tips and Tricks | Zsolt Nagy
- The Slack Logger | Baran Kucukguzel
- Messaging with RabbitMQ + Python | Marcelo Cure
- Why You Should Use Timezone Offsets Not Timezone Names | tantek.com
- The Quick Fix | Nick Harris
- Exploiting Android Users for Fun and Profit | The Code Word
- Low-overhead rendering with Vulkan | Android Developers Blog
- JavaScript Survival Tools for the Java Developer | Inspired by Actual Events
- Testing UI changes in large web applications | Xebia
- Interface over-segregation | Edmund Kirwan
Concurrency, Performance and Scalability
- How Google Invented an Amazing Datacenter Network Only They Could Create | High Scalability
Big Data, Visualization, SQL and NoSQL
- In-memory Data Model and Persistence for Big Data | Java Code Geeks
- Database versioning best practices | Enterprise Craftsmanship
Infrastructure, Operations and DevOps
- Smaller Java images with Alpine Linux | Atlassian Developers
Security, Encryption and Cryptography
- Researchers Discover Rootkit Exploit In Intel Processors That Dates Back To 1997 | HotHardware
- TOFU, Keybase, and Other Vegan Security Choices | Harlan Lieberman-Berg
- Full TrustZone exploit for MSM8974 | Bits, Please!
- Data, Technologies and Security – Part 1 | BinaryEdge
IaaS, PaaS, Saas and *aas
Link Collections
- The 30 Best Web Design Newsletters To Subscribe To | Six Revisions
- Double Shot #1536 | A Fresh Cup