Google offers fuzzing tool for Chrome for automated testing

fuzzing involves sending random data at a piece of software to crash it and capturing the conditions at the time of the crash.
[…]
libFuzzer attacked individual components of Chrome, sending the random data directly to the API. It’s a coverage-guided fuzzer, meaning it measures “code coverage for every input, and accumulate test cases that increase overall coverage”.

Guided coverage is also what Mountain View wants to offer for the world of open source software.

Described as in an “early stage”, the authors say their current focus is on libFuzzer, with documentation teaching users how to:

Add fuzzing to an open source project:
How to build and run fuzzers into a target source code repo; and
Build and run external fuzzers.

Source: Google offers baseball bat and some chains with which to hit open source software

Avtech devices 14 serious unpatched vulnerabilities

Avtech is the second most popular search term in Shodan. According to Shodan, more than 130.000 Avtech devices are exposed to the internet.

That’s because there are 14 serious unpatched vulnerabilities, the guide in the link goes through.

Ensure the admin interface is not exposed to the internet, change the default admin password if you own one of these cameras!

Source: Avtech devices multiple vulnerabilities