A cyberespionage group of Russian origin known as Pawn Storm is infecting Linux systems with a simple but effective Trojan program that doesn’t require highly privileged access.
Source: Russian cyberspy group uses simple yet effective Linux Trojan
A cyberespionage group of Russian origin known as Pawn Storm is infecting Linux systems with a simple but effective Trojan program that doesn’t require highly privileged access.
Source: Russian cyberspy group uses simple yet effective Linux Trojan
How important is the cloud, particularly the hybrid cloud, to your organization? Take Tech Pro Research’s survey and get a free copy of the research report on the topic.
Source: Survey: How fast are you moving to a hybrid cloud? | ZDNet
Many banks are now issuing customers more secure chip-based credit cards, and most retailers now have card terminals in their checkout lanes that can handle the “dip” of chip-card transactions (as opposed to the usual swipe of the card’s magnetic stripe). But comparatively few retailers actually allow chip transactions: Most are still asking customers to swipe the stripe instead of dip the chip. This post will examine what’s going on here, why so many merchants are holding out on the dip, and where this all leaves consumers.
Read more here…
Linux has powerful tools to help you quickly and efficiently retrieve a file. This free PDF download will show you how to use two of the most useful ones.
Source: How to use locate and grep to find files on a Linux (or OS X) system
OOOps!! Why isn’t Microsoft using MS-SQL?
The backend database supporting Microsoft’s careers page contained an authentication flaw which allowed attackers to modify the database’s job listing pages.
Source: Microsoft careers data exposed by MongoDB flaw | ZDNet
Ooooo… someone is getting fired.
A cyberattack launched against the Hollywood Presbyterian Medical Center has forced staff to declare an “internal emergency” and left employees unable to access patient files.
According to NBC, the Southern California hospital has been left unable to practice its usual day-to-day operations. The hospital’s president and CEO Allen Stefanek said “significant IT issues” were discovered last week, leading to emergency measures including calling for the assistance of the FBI, Los Angeles Police Department (LAPD) and cyberforensics experts.
Source: Hollywood hospital becomes ransomware victim | ZDNet
Spending money on security isn’t going to solve the problem alone — CIOs need the rest of their organisation to understand the risks too.
Source: Your whole organisation needs to get real about IT security: Here’s how to do it | ZDNet
Think about it: If somebody wants to really wreck your life, all they need is access to your personal email account. Because all too often, a single email address can grant access to your bank account, all the shopping sites you keep your credit card stored on, not to even mention all your personal private
Source: Before someone hijacks your Facebook or Gmail, here’s what you need to turn on
There is no evidence to suggest that Windows 10 is “spying” on you, but if network analysis of the telemetry data isn’t enough to put your mind at ease, here are a couple of tools that may help.
Source: Worried that Windows 10 is ‘spying’ on you? Here’s how to take back control | ZDNet
Ever wonder why your computer is slow? Or how much of your CPU, memory, and bandwidth a particular program is using? Task Manager is how you can find out, and also how you can close applications that are no longer responding. Geeks noticed the humble Task Manager got a critical update back in 2012 with
Source: Here’s every trick the Windows Task Manager can pull off