Showing headlines posted by penguinist
« Previous ( 1 2 3 4 5 ... 6 ) Next »Protect yourself from cyberattacks
I mentioned Linux, which has a few advantages. Windows as you are familiar with, is susceptible to infections by malware (viruses, adware, spyware, etc.), whereas Linux is practically invulnerable to infection.
PLC-Blaster Worm Targets Industrial Control Systems
Security researchers at Black Hat USA described a proof-of-concept worm that targets weaknesses within automated industrial control systems used to manage critical infrastructure and manufacturing. The worm, according to OpenSource Security, has the capability to autonomously search for and spread between networked programmable logic controllers (PLCs).
Never Trust a Found USB Drive, Black Hat Demo Shows Why
Does dropping an infected USB drive in a parking work when it comes to a hacker luring its prey into a digital trap? The answer is a resounding yes. At Black Hat USA, security researcher Elie Bursztein shared the results of an experiment where he dropped 297 USB drives with phone-home capabilities on the University of Illinois Urbana-Champaign campus.
Top 6 Desktop Linux Blunders
Ever since I first tried Linux on my desktop years ago, I've found myself wincing at what I felt were avoidable blunders. This observation doesn't affect one distro more than another, rather it's ongoing issues I've watch in utter amazement happen time and time again.
Raspberry Pi Zero Becomes Mighty Miniature Minecraft Machine
In a clever bit of miniaturization, [JediJeremy] has nearly completed a gyro-mouse controller for a Raspberry Pi Zero! Ultimately this will be a wearable Linux-watch but along the way he had some fun with the interface.
Study: Encryption use increase largest in 11 years
Enterprise use of encryption saw the largest increase over the past year in over a decade, according to a report...
Which browser is best for battery life: We test Edge vs. Chrome vs. Opera vs. Firefox
I began testing the question of different web browsers’ impact on battery life about two months ago, and what I’ve concluded is that there’s a lot of work to be done here.
The Internet Without Connection, Free Endless OS For Emerging Markets
According to the technical team at Endless OS, this operating system is not your typical Linux distribution. “We don’t use rpm, apt or any other packaging system. We use a read-only root file system managed by OSTree with application bundles overlaid on top.
Updating code can mean fewer security headaches
Organizations with high rates of code deployments spend half as much time fixing security issues as organizations without such frequent code updates, according to a newly released study.
House Poised to Advance Privacy and Defend Encryption…If Allowed to Vote
A bipartisan group of House members are preparing to introduce measures widely supported by their colleagues that would reign in NSA domestic surveillance and protect encryption. But a change in procedure adopted by the House leadership may deny the House a chance to even consider their proposal.
Everything We Know About How the FBI Hacks People
Recent headlines warn that the government now has greater authority to hack your computers, in and outside the US. Changes to federal criminal court procedures known as Rule 41 are to blame; they vastly expand how and whom the FBI can legally hack. But just like the NSA’s hacking operations, FBI hacking isn’t new. In fact, the bureau has a long history of surreptitiously hacking us, going back two decades.
How to empty your bank's vault with a few clicks and lines of code
A security researcher has demonstrated how he could have theoretically emptied an Indian bank's coffers with no more than a few clicks and lines of code.
It's trivially easy to identify you based on records of your calls and texts
Contrary to the claims of America's top spies, the details of your phone calls and text messages—including when they took place and whom they involved—are no less revealing than the actual contents of those communications.
Enterprises Bullish On 100 GbE, Cloud, And SDN
enterprises are ramping up their shift to 100 Gigabit Ethernet, with one in four already implementing it and two out of three planning to adopt it by 2017.
Security researcher arrested for disclosing US election website vulnerabilities
Security researcher David Levin was arrested and held by US law enforcement after breaking into and disclosing vulnerabilities in the Lee County state elections web domain.
How to Backup or Clone a Partition in Linux
Here is how you can clone and back-up important partitions on Linux PCs/Tablets...
Linus On Linux - Two Videos
The Linux phenomenon is, well what can you say other than phenomenal, and the man behind it is either a hero or an anti-hero to every programmer. One day you might grow up and become a Linus. So a recent Ted talk and a strange promo video for Linux are worth watching.
How to Conduct Internal Penetration Testing
Automated penetration testing tools and open source tools, especially those in Linux security distributions, are invaluable aids for internal pentests... In the simplest terms, a penetration test consists of a number of steps:
NIST readies 'post-quantum' crypto competition
Your mission, should you choose to accept it, is to help the National Institute of Standards and Technology (NIST) defend cryptography against the onslaught of quantum computers.
A DIY guide to the Aquaris M10 Ubuntu Edition tablet
With the Aquaris M10 Ubuntu Editon tablet seeping into the hands of many and questions asked around how the tablet has the ability to take on various modes – we thought we’d create a DIY one-pager that shows you how versatile the tablet truly is! Check out the guide below to follow the steps…