The revelation that online attacks are being mounted using a large network of compromised Linux computers shouldn’t deter you from trying out an open-source desktop.
Source: Why a Linux-powered botnet shouldn’t send you scurrying back to Windows
The revelation that online attacks are being mounted using a large network of compromised Linux computers shouldn’t deter you from trying out an open-source desktop.
Source: Why a Linux-powered botnet shouldn’t send you scurrying back to Windows
The revelation that online attacks are being mounted using a large network of compromised Linux computers shouldn’t deter you from trying out an open-source desktop.
Source: Why a Linux-powered botnet shouldn’t send you scurrying back to Windows
One more reason to not by Lenovo… the Chinese purchaser of the IBM Thinkpad line of PCs.If you think Lenovo is done spying on you via your Windows computer without explicitly informing you about what’s going one, especially after the major Superfish spying scandal from mid-February, then you’re wrong. DON’T MISS: Huge iOS 9 security flaw lets anyone see your photos and contacts without
Source: Lenovo caught yet again spying on Windows PC users
Things your IT personnel don’t want you to know…
So that’s why the printer is still jammed?
Source: 12 Secrets of Your Company’s IT People
Criminals are selling your stolen personal data for as little as $1 on the “dark web” and it’s mainly your fault, a new report revealed.
Source: Hackers are selling your data on the ‘dark web’… for only $1
Of all the cyber threats driving headlines, malvertising – seeding malicious code in online advertisements to infect unsuspecting users – might be the most jarring and difficult for many Web surfers to fathom. No one expects to get infected with malware when they visit trusted sites like YouTube or Reuters – hardly the seedy sides of the…
Source: Why Malvertising Is Cybercriminals’ Latest Sweet Spot
Apple Inc (APPL.O) said on Sunday it is cleaning up its iOS App Store to remove malicious iPhone and iPad programs identified in the first large-scale attack on the popular mobile software outlet. It is the first reported case of large numbers of malicious software programs making their way past Apple’s stringent app review process. Prior to this attack, a total of just five malicious apps had ever been found in the App Store, according to cyber security firm Palo Alto Networks Inc (PANW.N).
Source: Apple’s iOS App Store suffers first major attack
Microsoft has built a Linux-based operating system for datacenter switches. Does this mean a Microsoft Linux distribution is just around the corner? Um… no.
Source: Microsoft demonstrates its Linux-based Azure Cloud Switch operating system | ZDNet
This map of U.S. Internet cables is available to the public for first time
See more here…
Researchers have detected an attack that has installed rogue firmware on business routers in four countries.
Source: Attackers install highly persistent malware implants on Cisco routers