A code injection vulnerability in the Bourne again shell (Bash) has been disclosed on the internet. …

A code injection vulnerability in the Bourne again shell (Bash) has been disclosed on the internet. If exploited then arbitrary commands can be executed, and where Bash is used in relation to a network service, for example in CGI scripts on a web server, then the vulnerability will allow remote code execution.

(LiveHacking.Com) – A code injection vulnerability in the Bourne again shell (Bash) has been disclosed on the internet. If exploited then arbitrary commands can be executed, and where Bash is used in relation to a network service, for example in CGI scripts on a web server, …

Apple addressed 56 unique CVEs in iOS 8. Among the changes are fixes for bugs which could allow an attacker…

Apple addressed 56 unique CVEs in iOS 8. Among the changes are fixes for bugs which could allow an attacker with access to an iOS device to access sensitive user information from logs, allow a local attacker to escalate privileges and install unverified applications, and fixes for bugs that allow some kernel hardening measures may be bypassed.

(LiveHacking.Com) – Along side the release of the iPhone 6 and iPhone 6 Plus Apple has also released a new version of its mobile operating system. iOS 8 includes improvements to Siri and the ability for third parties to add widgets to the notification area. Apple are calling it “huge for …

Imagination Technologies (the makers of the PowerVR GPU and MIPS processors) just quoted from my Android…

Imagination Technologies (the makers of the PowerVR GPU and MIPS processors) just quoted from my Android Authority article about their new MIPS I6400 processor. :-)

MIPS I6400 is a highly scalable CPU that addresses a wide range of markets – everything from mobile devices and smart TVs to automotive and servers.

How to update your Raspberry Pi with the new September 2014 release.

How to update your Raspberry Pi with the new September 2014 release.

You can update the system and packages with

sudo apt-get update
sudo apt-get upgrade
sudo rpi-update

This will update your kernel and all the packages you have installed. For example if your image had Sonic Pi v1 installed, the package will be updated to v2.

For packages which are new to the image, like Minecraft and the browser, you’ll have to explicitly install them, e.g.

sudo apt-get install minecraft-pi
sudo apt-get install epiphany-browser

Thanks to Ben Nuttall.

If you head over to the downloads page, you’ll find new versions of our Raspbian image and NOOBS installer. Alongside the usual firmware and kernel improvements, major changes to the Raspbian image include: Java updated to JDK 8; Mathematica updated to version 10; Sonic Pi updated to version 2 …

New version Raspbian for the Raspberry Pi released. Alongside the usual firmware and kernel improvements…

New version Raspbian for the Raspberry Pi released. Alongside the usual firmware and kernel improvements, major changes to the Raspbian image include:

Java updated to JDK 8
Mathematica updated to version 10
Sonic Pi updated to version 2
Minecraft Pi pre-installed

If you head over to the downloads page, you’ll find new versions of our Raspbian image and NOOBS installer. Alongside the usual firmware and kernel improvements, major changes to the Raspbian image include: Java updated to JDK 8; Mathematica updated to version 10; Sonic Pi updated to version 2 …

Researchers use flaw in how LinkedIn handles email addresses to discover the private email address of…

Researchers use flaw in how LinkedIn handles email addresses to discover the private email address of Mark Cuban, the owner of the Dallas Mavericks. Tests how around a 90% success rate in finding addresses.

(LiveHacking.Com) – Benjamin Caudill and Bryan Seely, founders of Rhino Security, have discovered an unintentional side effect of LinkedIn’s obsession with making sure you are “linked” with just about everyone you have had contact with. According to the new research, which was published in part …

Apple adds brute force protection in its ‘Find My iPhone’ service API.

Apple adds brute force protection in its ‘Find My iPhone’ service API.

(LiveHacking.Com) – Reports are starting to emerge that Apple has patched a weakness in its ‘Find My iPhone’ service that could have been used by hackers to steal private photos of nearly 100 Hollywood celebrities. Over the weekend an anonymous hacker posted revealing pictures of nearly 100 …