Category Archives: cybersecurity

We all understand the risk of someone taking over our computers or phones for nefarious purposes. But remote access to printers and fax machines was something most people took a little less seriously. After all, you might get some obscene printouts or someone wasting some paper, but in general, those are not big deals. Some researchers however have lately been pondering what might happen should someone break into your 3D printer. Of course, you could bring a printer down to deny service, or cause things to malfunction — maybe even in ways that could be dangerous if the printer didn’t …read more

via 3D Printing, Cybersecurity, and Audio Fingerprinting — Hackaday

Google’s Selfish Ledger Is An Unsettling Vision Of Social Engineering by https://ift.tt/2GKGGQQ

Google’s multibillion-dollar business was built by collecting all the information available to its users. Selfish Ledger is a video produced by Google that offers a stunningly ambitious and unsettling perception of how some people at the company envision to use that information in the future.

from https://ift.tt/2GKGGQQ

Selected by Galigio via Computer Borders

Opera now protects you from cryptojacking attacks by https://is.gd/kA4S26

Opera today launched version 50 of its desktop browser. Sadly, this release doesn’t come with a cake to celebrate this milestone (not even a tiny cupcake), but the newest release does include a new feature that makes sure that nobody can mine crytocurrencies in your browser.

In Opera, this new cryptojacking feature is automatically enabled when you turn on the browser’s ad blocking tool.

from https://is.gd/kA4S26

Selected by Galigio via Computer Borders

How To Use VeraCrypt On Linux by https://is.gd/HFNBWZ

For years, TrueCrypt was the encryption tool of choice for Linux users. It worked well, and it did everything you could ever want. Then one day, the project was discontinued. Ever since then, Linux users have been scrambling to find an encryption tool that works as well.

For most, the best tool to use is VeraCrypt. The main reason that VeraCrypt stands out from the rest of the new encryption tools is that it is a “fork” from the old TrueCrypt code. This means if you’ve used TrueCrypt for years but want something that is actively maintained, you can install VeraCrypt on Linux and everything will continue to work.

from https://is.gd/HFNBWZ

Selected by Galigio via Computer Borders

The Increasing Effect of Geopolitics on Cybersecurity by http://bit.ly/2xTAkM8

The effect of geopolitics on cybersecurity can be seen daily – from Chinese cyber espionage to Russian attacks on the Ukraine and North Korea’s financially-motivated attacks against SWIFT and Bitcoins – and, of course, Russian interference in western elections and notably the US 2016 presidential election.

The primary cause is political mistrust between different geopolitical regions combined with the emergence of cyberspace as a de facto theater of war.

from http://bit.ly/2xTAkM8

Selected by Galigio via Computer Borders

Security Tools to Check for Viruses and Malware on Linux by https://is.gd/VLyo98

antiv-main

Wait, Linux needs antivirus and anti-malware solutions? I thought it was immune to such things. Perhaps a bit of clarification is necessary here. First and foremost, no operating system is 100 percent immune to attack. Whether a machine is online or offline, it can fall victim to malicious code.

Although Linux is less prone to such attacks than, say, Windows, there is no absolute when it comes to security. I have witnessed, first hand, Linux servers hit by rootkits that were so nasty, the only solution was to reinstall and hope the data backup was current. I’ve been a victim of a (very brief) hacker getting onto my desktop, because I accidentally left desktop sharing running (that was certainly an eye opener). The lesson? Even Linux can be vulnerable.

from https://is.gd/VLyo98

Selected by Galigio via Computer Borders

Why Legislation Alone Won’t Solve IoT Cybersecurity by https://is.gd/0lUNkk

Few people would argue that cybersecurity is in a parlous state. In the last few weeks, we’ve seen a connected car wash and fish tank hacked respectively and a smart gun unlocked and fired thanks to a magnet at the latest DefCon. In response to the problem, a bipartisan group of U.S. senators has put forward new legislation to address the security problems of the Internet of Things. The new bill, introduced on Tuesday, would require vendors that provide connected equipment to the U.S. government ensure products are patchable and meet industry security standards, according to Reuters.

The Internet of Things (IoT) Cybersecurity Improvement Act of 2017 is backed by the co-chairs of the Senate Cybersecurity Caucus — Democrat Mark R. Warner and Republican Cory Gardner, as well as Democrat Senator Ron Wyden and Republican Senator Steve Daine.

from https://is.gd/0lUNkk

Selected by Galigio via Computer Borders