Some MacBooks have two graphics cards, the specific one this post is about is a MacBookPro8,2 (15-inch, Late2011) with an Intel HD Graphics 3000 and an AMD Radeon HD 6750M.
If you boot any OS into legacy BIOS mode (only option supported by – at this time – most recent release version 5.8 of OpenBSD), it is always the Radeon card that gets activated (except for Windows OS, where Bootcamp/drivers should handle the automatic switching just like in Mac OS).
You need an external USB WLAN card (or something else, if you want network access), because the internal one is not supported by OpenBSD.
Android Wear gets wide Marshmallow rollout, adds speaker and LTE support
The Android 6.0 Marshmallow update for Android Wear is back. The update debuted on the disastrous LG Watch Urbane 2nd Edition LTE in November, but due to "image quality issues," LG pulled the watch from the market after only six days. The Marshmallow Android Wear update seemed to go down with the Watch Urbane, and the update went missing in action for the last two months. According to a post on the Official Android Blog, it's now back and will now roll out to "all Android Wear watches over the next few weeks."
An open source network utility used by administrators and security professionals contains a cryptographic weakness so severe that it may have been intentionally created to give attackers a surreptitious way to eavesdrop on protected communications, its developer warned Monday.
Socat is a more feature-rich variant of the once widely used Netcat networking service for fixing bugs in network applications and for finding and exploiting security vulnerabilities. One of its features allows data to be transmitted through an encrypted channel to prevent it from being intercepted by people monitoring the traffic. Amazingly, when using the Diffie-Hellman method to establish a cryptographic key, Socat used a non-prime parameter to negotiate the key, an omission that violates one of the most basic cryptographic principles.
The developers of the Neutrino exploit kit have added a new feature intended to thwart security researchers from studying their attacks.
The feature was discovered after Trustwave's SpiderLabs division found computers they were using for research couldn't make a connection with servers that delivered Neutrino.