Showing headlines posted by penguinist

« Previous ( 1 2 3 4 5 ... 6 ) Next »

Lenovo Yoga Book 2-in-1 PC With Chrome OS Coming In 2017

Yes! It is confirmed that Lenovo is going to bring a Yoga Book 2-in-1 PC on Google Chrome OS in 2017. In a recent interview, Vice President of Lenovo Jeff Meredith confirmed that Lenovo Yoga Book would release in 2017. The primary user interface is Linux and the Chrome browser.

Here’s The Evidence Russia Hacked The Democratic National Committee

  • Time; By Massimo Calabresi (Posted by penguinist on Dec 14, 2016 11:11 AM EDT)
  • Story Type: Security
CrowdStrike also found the other group of hackers, Fancy Bear, was sending command and control instructions from a server with an Internet Protocol (IP) address of 176.31.112.10. This was the same IP address that was linked to command and control of an attack against the German parliament in 2015.

FBI Gains New Hacking Powers

  • The District Sentinel; By Sam Sacks (Posted by penguinist on Dec 2, 2016 11:06 PM EDT)
  • Story Type: Security
The FBI is now allowed to hack into computers anywhere in the world using only a single warrant, according to a new rule that was quietly implemented on Thursday.

Deutsche Telekom Says Cyber Attack Hits 900,000 Customers

  • TheStreet; By Mariko Iwasaki (Posted by penguinist on Nov 28, 2016 11:14 AM EDT)
  • Story Type: Security
"We cannot exclude the possibility that the routers have been targeted by external parties with the result that they can no longer register on the network," the telecom company said.

Build Your Own Computer

  • The New York Times; By J.D. Biersdorfer (Posted by penguinist on Nov 26, 2016 7:17 PM EDT)
  • Story Type: Tutorial
The officially supported system for the Raspberry Pi is called Raspbian, and it is based on Debian, which has Linux roots and is versatile enough to run on other hardware, too. The Raspberry Pi — which started out in 2012 as a low-cost bare-bones motherboard meant to teach computer fundamentals — can also run other operating systems, including a special version of Ubuntu Linux.

Want to Know if the Election was Hacked? Look at the Ballots

  • medium.com; By J. Alex Halderman (Posted by penguinist on Nov 25, 2016 9:25 PM EDT)
  • Story Type: Security
Let me set the record straight about what I and other leading election security experts have actually been saying to the campaign and everyone else who’s willing to listen.

Microsoft Warns Bash on Windows Users About Linux File Changes

This week, Microsoft offered the equivalent of a nun's ruler smack to users of Bash on Windows, a command-line shell that's more usually known as a tool for Linux developers and IT pros... "DO NOT, under ANY circumstances, create and/or modify Linux files using Windows apps, tools, scripts, consoles, etc.,"the announcement stated.

Google’s neural networks invent their own encryption

  • New Scientist; By Timothy Revell (Posted by penguinist on Oct 28, 2016 11:24 AM EDT)
  • Story Type: Security
Computers are keeping secrets. A team from Google Brain, Google’s deep learning project, has shown that machines can learn how to protect their messages from prying eyes.

Argo Project Developing OS Technology for Exascale

Argo, a Department of Energy project at Argonne aimed at developing the prototype for an open-source OS that will work on any type of high-performance machine made by any vendor and will allow users to mix and match modular OS components to suit their needs... They’re developing modifications to Linux that will let the OS manage power throughout a high-performance machine.

Smallest. Transistor. Ever.

“The semiconductor industry has long assumed that any gate below 5 nanometers wouldn’t work, so anything below that was not even considered,” said study lead author Sujay Desai, a graduate student in Javey’s lab. “This research shows that sub-5-nanometer gates should not be discounted. Industry has been squeezing every last bit of capability out of silicon. By changing the material from silicon to MoS2, we can make a transistor with a gate that is just 1 nanometer in length, and operate it like a switch.”

Taking down the internet: possible but how probable?

  • CSO; By Taylor Armerding (Posted by penguinist on Oct 6, 2016 11:59 AM EDT)
  • Story Type: Security
Unknown players – probably a nation state – are probing the defenses of the core infrastructure of the internet. How worried should we be?

Blockchain Summit Day Two: End-Of-Conference Highlights From Shanghai

Garzik drew on lessons from working at Red Hat in the early days of Linux Enterprise, and discussed the "missing pieces from DIY, download-it-yourself" programs for enterprise deployments serving corporations that need service and maintenance. For that, he was betting on open-source community development.

How To Get “Hollywood Hacker Feel” In Your Linux Command Line?

  • fossBytes; By Aditya Tiwari (Posted by penguinist on Sep 22, 2016 4:54 AM EDT)
  • Story Type: Reviews
A developer has created a command line utility which can give you the feel of Hollywood movie hacker. His tool replicates the decrypting text seen from the 1992 hacker movie Sneakers. The code is freely available on his GitHub page.

The Feds Will Soon Be Able to Legally Hack Almost Anyone

  • Wired; By Susan Landau (Posted by penguinist on Sep 15, 2016 10:22 AM EDT)
  • Story Type: Security
The new plan to drastically expand the government’s hacking and surveillance authorities is known formally as amendments to Rule 41 of the Federal Rules of Criminal Procedure, and the proposal would allow the government to hack a million computers or more with a single warrant. If Congress doesn’t pass legislation blocking this proposal, the new rules go into effect on December 1.

Long-Secret Stingray Manuals Detail How Police Can Spy on Phones

  • The Intercept; By Sam Biddle (Posted by penguinist on Sep 14, 2016 12:21 PM EDT)
  • Story Type: Security
Harris Corp.’s Stingray surveillance device has been one of the most closely guarded secrets in law enforcement for more than 15 years. The company and its police clients across the United States have fought to keep information about the mobile phone-monitoring boxes from the public against which they are used. The Intercept has obtained several Harris instruction manuals spanning roughly 200 pages...

White House appoints first Federal Chief Information Security Officer

... retired Brigadier General Gregory J. Touhill will serve as the first federal Chief Information Security Officer (CISO). "The CISO will play a central role in helping to ensure the right set of policies, strategies, and practices are adopted across agencies and keeping the Federal Government at the leading edge of 21st century cybersecurity"

More Than 40% Of Attacks Abuse SSL Encryption

  • Dark Reading; By Steve Zurier (Posted by penguinist on Sep 1, 2016 10:04 AM EDT)
... companies need to start thinking about using technologies that can inspect SSL packets and quarantine the bad or malicious packets.

Skype for Windows Phone walked behind shed, shot heard

Microsoft's killed off a native Skype client for Windows Phone and will force users to rely on Web Skype instead. WinPho users won't be alone: Redmond will also discontinue Skype clients on Android 4.02 or lower and iOS 7. Microsoft has already announced that OS X and Linux will lose native clients under its Skype-for-the-cloud strategy.

Fuchsia is Google's latest operating system

  • Beta News; By Mark Wilson (Posted by penguinist on Aug 14, 2016 5:49 PM EDT)
  • Story Type: News Story
Google has a new operating system project underway called Fuchsia. There's a GitHub page up and running, where you can find out about the Fuchsia kernel -- a kernel that is designed with scalability and multi-device, cross-platform compatibility in mind.

Android bug fear in 900 million phones

Serious security flaws that could give attackers complete access to a phone's data have been found in software used on tens of millions of Android devices. The bugs were uncovered by Checkpoint researchers looking at software running on chipsets made by US firm Qualcomm.

« Previous ( 1 2 3 4 5 ... 6 ) Next »