Showing headlines posted by penguinist

« Previous ( 1 2 3 4 ... 5 ) Next »

PLC-Blaster Worm Targets Industrial Control Systems

  • ars technica; By Tom Spring (Posted by penguinist on Aug 7, 2016 8:48 AM EDT)
  • Story Type: Security
Security researchers at Black Hat USA described a proof-of-concept worm that targets weaknesses within automated industrial control systems used to manage critical infrastructure and manufacturing. The worm, according to OpenSource Security, has the capability to autonomously search for and spread between networked programmable logic controllers (PLCs).

Never Trust a Found USB Drive, Black Hat Demo Shows Why

  • threat post; By Tom Spring (Posted by penguinist on Aug 5, 2016 2:21 PM EDT)
  • Story Type: Security
Does dropping an infected USB drive in a parking work when it comes to a hacker luring its prey into a digital trap? The answer is a resounding yes. At Black Hat USA, security researcher Elie Bursztein shared the results of an experiment where he dropped 297 USB drives with phone-home capabilities on the University of Illinois Urbana-Champaign campus.

Top 6 Desktop Linux Blunders

  • Datamation; By Matt Hartley (Posted by penguinist on Jul 19, 2016 5:08 AM EDT)
  • Groups: Linux
Ever since I first tried Linux on my desktop years ago, I've found myself wincing at what I felt were avoidable blunders. This observation doesn't affect one distro more than another, rather it's ongoing issues I've watch in utter amazement happen time and time again.

Raspberry Pi Zero Becomes Mighty Miniature Minecraft Machine

In a clever bit of miniaturization, [JediJeremy] has nearly completed a gyro-mouse controller for a Raspberry Pi Zero! Ultimately this will be a wearable Linux-watch but along the way he had some fun with the interface.

Study: Encryption use increase largest in 11 years

  • CSO; By Maria Korolov (Posted by penguinist on Jun 29, 2016 10:02 PM EDT)
  • Story Type: Security
Enterprise use of encryption saw the largest increase over the past year in over a decade, according to a report...

Which browser is best for battery life: We test Edge vs. Chrome vs. Opera vs. Firefox

  • PCWorld; By Gordon Mah Ung (Posted by penguinist on Jun 27, 2016 11:54 AM EDT)
  • Story Type: Reviews
I began testing the question of different web browsers’ impact on battery life about two months ago, and what I’ve concluded is that there’s a lot of work to be done here.

The Internet Without Connection, Free Endless OS For Emerging Markets

According to the technical team at Endless OS, this operating system is not your typical Linux distribution. “We don’t use rpm, apt or any other packaging system. We use a read-only root file system managed by OSTree with application bundles overlaid on top.

Updating code can mean fewer security headaches

  • CSO; By Phil Krill (Posted by penguinist on Jun 24, 2016 10:07 AM EDT)
  • Story Type: Security
Organizations with high rates of code deployments spend half as much time fixing security issues as organizations without such frequent code updates, according to a newly released study.

House Poised to Advance Privacy and Defend Encryption…If Allowed to Vote

  • Electronic Frontier Foundation; By Shahid Buttar (Posted by penguinist on Jun 13, 2016 11:31 AM EDT)
  • Story Type: Security
A bipartisan group of House members are preparing to introduce measures widely supported by their colleagues that would reign in NSA domestic surveillance and protect encryption. But a change in procedure adopted by the House leadership may deny the House a chance to even consider their proposal.

Everything We Know About How the FBI Hacks People

  • Wired; By Kim Zetter (Posted by penguinist on May 21, 2016 11:07 AM EDT)
  • Story Type: Security
Recent headlines warn that the government now has greater authority to hack your computers, in and outside the US. Changes to federal criminal court procedures known as Rule 41 are to blame; they vastly expand how and whom the FBI can legally hack. But just like the NSA’s hacking operations, FBI hacking isn’t new. In fact, the bureau has a long history of surreptitiously hacking us, going back two decades.

How to empty your bank's vault with a few clicks and lines of code

  • ZDNet; By Charlie Osborne (Posted by penguinist on May 18, 2016 4:23 PM EDT)
  • Story Type: Security
A security researcher has demonstrated how he could have theoretically emptied an Indian bank's coffers with no more than a few clicks and lines of code.

It's trivially easy to identify you based on records of your calls and texts

  • Daily Dot; By Eric Geller (Posted by penguinist on May 18, 2016 1:32 PM EDT)
  • Story Type: Security
Contrary to the claims of America's top spies, the details of your phone calls and text messages—including when they took place and whom they involved—are no less revealing than the actual contents of those communications.

Enterprises Bullish On 100 GbE, Cloud, And SDN

enterprises are ramping up their shift to 100 Gigabit Ethernet, with one in four already implementing it and two out of three planning to adopt it by 2017.

Security researcher arrested for disclosing US election website vulnerabilities

Security researcher David Levin was arrested and held by US law enforcement after breaking into and disclosing vulnerabilities in the Lee County state elections web domain.

How to Backup or Clone a Partition in Linux

  • techworm; By Abhishek Awasthi (Posted by penguinist on May 8, 2016 10:16 PM EDT)
  • Story Type: Tutorial
Here is how you can clone and back-up important partitions on Linux PCs/Tablets...

Linus On Linux - Two Videos

  • i-programmer; By Alex Armstrong (Posted by penguinist on May 8, 2016 6:27 PM EDT)
  • Story Type: Interview; Groups: Linux
The Linux phenomenon is, well what can you say other than phenomenal, and the man behind it is either a hero or an anti-hero to every programmer. One day you might grow up and become a Linus. So a recent Ted talk and a strange promo video for Linux are worth watching.

How to Conduct Internal Penetration Testing

  • eSecurity Planet; By Paul Rubens (Posted by penguinist on May 4, 2016 3:56 PM EDT)
  • Story Type: Security
Automated penetration testing tools and open source tools, especially those in Linux security distributions, are invaluable aids for internal pentests... In the simplest terms, a penetration test consists of a number of steps:

NIST readies 'post-quantum' crypto competition

Your mission, should you choose to accept it, is to help the National Institute of Standards and Technology (NIST) defend cryptography against the onslaught of quantum computers.

A DIY guide to the Aquaris M10 Ubuntu Edition tablet

With the Aquaris M10 Ubuntu Editon tablet seeping into the hands of many and questions asked around how the tablet has the ability to take on various modes – we thought we’d create a DIY one-pager that shows you how versatile the tablet truly is! Check out the guide below to follow the steps…

Changing your password regularly is a terrible idea, and here's why

  • ZDNet; By Steve Ranger (Posted by penguinist on Apr 18, 2016 3:05 PM EDT)
  • Story Type: Security
Making users change their passwords frequently could actually make systems less secure, the UK's information security agency has warned.

« Previous ( 1 2 3 4 ... 5 ) Next »