The vulnerable status of our Internet of Things (IoT) devices has gifted the DDoS tool with resources it cannot resist.
Source: LizardStresser botnet targets IoT devices to launch 400Gbps attacks | ZDNet
The vulnerable status of our Internet of Things (IoT) devices has gifted the DDoS tool with resources it cannot resist.
Source: LizardStresser botnet targets IoT devices to launch 400Gbps attacks | ZDNet
The irremovable Hummer is now the number one Trojan in the world, with over one million current victims.
Source: Android Trojan malware makes hackers $500,000 | ZDNet
Google’s Project Zero team has unearthed severe security holes in Symantec and Norton products which place you at serious risk.
Source: Symantec security flaws are “as bad as they get,” says researcher | ZDNet
Oops…
The list contains 2.2 million names of high-risk individuals and organizations — including those thought to be involved in financial crime and terrorism.
Source: A massive financial crime and terrorism database has leaked | ZDNet
We have been hearing a lot about Rule 41 after the US Department of Justice has pushed an update to the rule.
The change to the Rule 41 of the Federal Rules of Criminal Procedure grants the FBI much greater powers to hack legally into any computer across the country, and perhaps anywhere in the world, with just a single search warrant authorized by any US judge.
However, both civil liberties groups and tech companies have blasted the proposed change, saying it is an affront to the Fourth Amendment and would allow the cops and Feds in America to hack remotely into people’s computers and phones around the world.
Source: STOP Rule 41 — FBI should not get Legal Power to Hack Computers Worldwide
One of the most confusing and intimidating parts of installing Linux for dual-booting with Windows is the disk partitioning required.
Source: How to: Disk partitioning for Linux and Windows dual-booting | ZDNet
Nobody is immune to being Hacked!
After hacking Mark Zuckerberg’s Twitter and Pinterest accounts, Hacking group OurMine has successfully hacked the Quora account Google CEO Sundar Pichai and then cross-posted to his Twitter account.Source:
Google CEO Sundar Pichai’s Quora Account Hacked
Academic study sheds light on how medical professionals are often forced to find analog workarounds to combat unwieldy security solutions, putting patient care at risk.
Source: Medical Study Blasts Hospitals’ Security Practices | Threatpost | The first stop for security news
Red Hat this week announced the release of Fedora 24, an open source Linux operating system maintained by the Fedora Project community. Fedora Linux is the community version of Red Hat Enterprise Linux, or RHEL. Fedora 24 is comprised of a set of base packages that form the foundation of three distinct editions: Fedora 24 Cloud, Fedora 24 Server and Fedora 24 Workstation.
Source: Fedora 24 Pushes Linux Boundaries
Two-factor authentication is no longer an optional feature. If you use modern cloud services, this extra layer of security can dramatically reduce the risk of a hostile takeover. Here’s how to get started.
Source: Make your cloud safer: How you can use two-factor authentication to protect cloud services | ZDNet