Some say “panic,” some go into “guru meditation,” others “abnormally end.” On Windows, it’s a BSoD…
Source: Blue Screen of Death meets cybercrime – true or false? – Naked Security
Build 2016 saw Bash on Windows and a new PowerShell Docker module. What do the two mean for the future of the server?
Source: Bash on Windows, Powershell and Docker: Why Microsoft is calling time on the server GUI | ZDNet
Google seeks a balance between tough warnings and a helping hand when fixing up hijacked websites that may harm its users.
Source: Google warns 760,000 websites: ‘You’ve been hijacked’ – but many are infected again in days | ZDNet
A new debugging system found 23 previously undiagnosed security flaws in 50 popular Web applications, and it took no more than 64 seconds to analyze any given program.
Source: New Debugging Method Finds 23 Undetected Security Flaws in Popular Web Applications
LXLE is an ideal distro for out-of-the-box functionality to handle your everyday computing needs. It’s a well-oiled lightweight distribution based on Ubuntu’s long-term support releases for Debian and Lubuntu Linux from a community originating in the U.S. The latest version is 14.04.4, released last month. It runs an optimized LXDE that has a comfortable look and feel.
Source: LXLE Gives Aging Hardware a New Lease on Life
It’s often easy to blame Microsoft for every flaw and failing in our Windows update experience. The fault, dear reader, may not be in the updates, but in our own installs.
Source: When Windows 10 breaks, don’t just blame Microsoft | ZDNet
Of all the money-making schemes hackers employ, the most prevalent is perhaps ransomware, a malware that is usually delivered through infected email..
Source: How to deal with the rising threat of ransomware
The only backup you’ll ever regret… is the one you didn’t make.
Source: Sysadmin SNAFU flushes whole company down the drain – Naked Security
WASHINGTON (AP) — Hacking for ransom is on the rise — on pace to beat out last year’s figures — and hits people where it hurts, locking them out of files, photos and critical records until they pay hackers a bounty to restore their access. Hackers bait users to click on infected email links or open infected attachments, or they take advantage of outdated and vulnerable systems.
Source: 5 ways to become a smaller target for ransomware hackers
If you think ransomware is growing problem now, then the cryptoworms that are ‘right around the corner’ and described as the future of ransomware by researchers sound like a living hell.
Source: Cryptoworms: The future of ransomware hell