Articles for February 2016

Windows 10 telemetry secrets: Where, when, and why Microsoft collects your data | ZDNet


How does Windows 10 telemetry really work? It’s not a state secret. I’ve gone through the documentation and sorted out the where, when, and why. If you’re concerned about private documents accidentally leaving your network, you might want to turn the telemetry setting down.

Source: Windows 10 telemetry secrets: Where, when, and why Microsoft collects your data | ZDNet

Loading

Untitled


The hacker said their prime motivation for the backdoor was to build a botnet.
A lone hacker who duped hundreds of users into downloading a version of Linux with a backdoor installed has revealed how it was done.

News broke on Saturday that the website of Linux Mint, said to be the third most-popular Linux operating system distribution, had been hacked, and was tricking users all day by serving up downloads that contained a maliciously-placed “backdoor.”

Source: ZDNet

Loading

What is malvertising? | Malwarebytes Labs

With malvertising back in the headlines of the news, a refresher is, sometimes, needed…


We’re on a bit of an educational push here at Malwarebytes with the aim of helping Internet users become a bit more aware of the latest tricks that criminals are using to catch you out. Hopefully, this means you will be a bit safer online. Today’s post takes a closer look at ‘malvertising’.

Source: What is malvertising? | Malwarebytes Labs

Loading

“Locky” crypto-ransomware rides in on malicious Word document macro


Several security researchers have discovered a new type of malware that jumps onto the ransomware bandwagon, encrypting victims’ files and then demanding a payment of half a bitcoin for the key. Named “Locky,” the malware depends on a rather low-tech installation method to take root in a user’s system: it arrives courtesy of a malicious macro in a Word document.

Source: “Locky” crypto-ransomware rides in on malicious Word document macro

Loading

Hardware is hot in cybersecurity


There were two major announcements made yesterday by cybersecurity superpowers IBM and Cisco. Both of them rolled out some heavy artillery in the form of enterprise grade security hardware aimed at midsized and large enterprises.

IBM will be shipping its z13s mainframe in March – complete with with speedy encryption, cyber analytics, and other security innovations which are baked into the new machine.

Source: Hardware is hot in cybersecurity

Loading

How schools around the country are turning dead Microsoft PCs into speedy Chromebooks


The Ovid-Elsie school
district sits an hour west of Flint, Michigan, the city now notorious for being poisoned by its own penny-pinching administrators. The district, which serves roughly 1,600 students, is one of the poorer areas in the state, with a per capita income of just over $15,000. “We’re looking at close to three-quarters of our kids [who] are classified as economically disadvantaged here,” said Kris Kirby, the district’s assistant superintendent. So when it came time to find computer equipment for every classroom, Ovid-Elsie had to get creative.

Source: Learning the Alphabet | The Verge

Loading