Building and coding our own computers make us better equipped to tackle Big Tech.
Source: Tired of your Big Tech overlords? How Kano’s Computer Kit can help you break free | ZDNet
Building and coding our own computers make us better equipped to tackle Big Tech.
Source: Tired of your Big Tech overlords? How Kano’s Computer Kit can help you break free | ZDNet
If you thought the approximately $50,000 ransomware authors demanded from the city of Atlanta to unlock encrypted systems was a large sum, this next figure will make your head spin. On April 12, WSB-TV news in Atlanta aired a story about how the city signed eight emergency IT contracts within days of the ransomware attack.
The total bill from these service providers totaled $2.7 million dollars. The reason for the huge price tag? Atlanta was not able to bounce back quickly from the attack, which according to researchers, reveals much larger systemic problems.
Source: Atlanta spent $2.7M cleaning up after ransomware attack
Microsoft has open-sourced Windows File Manager, its first graphical interface for managing and accessing files, which debuted in its 1990 Windows 3.0 release
Source: Windows 10 revisits 1990: Now you can run Windows 3.0’s open-sourced File Manager | ZDNet
Security researchers at Embedi have disclosed a critical vulnerability in Cisco IOS Software and Cisco IOS XE Software that could allow an unauthenticated, remote attacker to execute arbitrary code, take full control over the vulnerable network equipment and intercept traffic.
The stack-based buffer overflow vulnerability (CVE-2018-0171) resides due to improper validation of packet data in Smart Install Client, a plug-and-play configuration and image-management feature that helps administrators to deploy (client) network switches easily.
Source: Critical flaw leaves thousands of Cisco Switches vulnerable to remote hacking
The number of organisations that have fallen victim to cyber-attackers only to fall victim a second time is on the up.
If you’re unlucky enough to fall victim to hackers, you’re likely to fall victim to a similar cyber-attack or data breach in the months following the initial problem.
According to the newly-released FireEye M-Trends annual report for 2018, 56 percent of organisations that were targets of a significant attack in the last year and a half were targeted a second time in that period. That figure is up from 38 percent in 2013.
Source: Once a target, always a target: If you’re hit by hackers you’re likely to be hit again | ZDNet
Keeping in mind that you don’t need to spend ANY money to do this… other than hardware. This is a good article if you are a Nutanix fan.
Is hyperconverged infrastructure simplifying the way data centers are managed, or is it providing more clever means for certain enterprise technology vendors to regain their strongholds? Our executive guide covers everything you need to know.
Source: What is hyperconvergence? Here’s how it works and why it matters | ZDNet
The malicious use of the cellular communications devices is a “real and growing risk,” a federal official told a US senator.
Source: Evidence of stingrays found in Washington, DC, Homeland Security says | ZDNet
So this was a tweet that someone I follow (@darkartlab) re-tweeted, original twitter sender being @_thp if you wish to go and check. It seems very plausible and as always, forewarned is forearmed, and it may be worth educating your friends, families and users!
Source: New Gmail password reset scam.