Category Archives: infosec

The Increasing Effect of Geopolitics on Cybersecurity by http://bit.ly/2xTAkM8

The effect of geopolitics on cybersecurity can be seen daily – from Chinese cyber espionage to Russian attacks on the Ukraine and North Korea’s financially-motivated attacks against SWIFT and Bitcoins – and, of course, Russian interference in western elections and notably the US 2016 presidential election.

The primary cause is political mistrust between different geopolitical regions combined with the emergence of cyberspace as a de facto theater of war.

from http://bit.ly/2xTAkM8

Selected by Galigio via Computer Borders

Security Tools to Check for Viruses and Malware on Linux by https://is.gd/VLyo98

antiv-main

Wait, Linux needs antivirus and anti-malware solutions? I thought it was immune to such things. Perhaps a bit of clarification is necessary here. First and foremost, no operating system is 100 percent immune to attack. Whether a machine is online or offline, it can fall victim to malicious code.

Although Linux is less prone to such attacks than, say, Windows, there is no absolute when it comes to security. I have witnessed, first hand, Linux servers hit by rootkits that were so nasty, the only solution was to reinstall and hope the data backup was current. I’ve been a victim of a (very brief) hacker getting onto my desktop, because I accidentally left desktop sharing running (that was certainly an eye opener). The lesson? Even Linux can be vulnerable.

from https://is.gd/VLyo98

Selected by Galigio via Computer Borders

How to Scan Your Linux Computer for Viruses and Rootkits by https://is.gd/Mcj0vO

Are you worried that your Linux computer may be infected with malware? Have you ever checked? While Linux systems tend to be less susceptible to malware than Windows, they can still be infected. Many times they’re less obviously compromised, too.

There are a handful of excellent open-source tools to help you check if your Linux system has been the victim of malware. While no software is perfect, these three have a solid reputation and can be trusted to find most known threats.

from https://is.gd/Mcj0vO

Selected by Galigio via Computer Borders

5 ways to create a secure firewall by https://is.gd/DwBX47

Firewalls represent the technological gateways into and out of companies, as well as serving to compartmentalize internal systems and networks to segregate them from one another.

Network traffic flowing through, or blocked by, firewalls does so based upon specific permissions intended to secure systems, services and users from unauthorized access or malicious threats.

A properly maintained firewall is one of the keys to business and operational success.

from https://is.gd/DwBX47

Selected by Galigio via Computer Borders

Configure VPN server in Linux for Windows / Linux clients by https://is.gd/9h1dpn

img_20170804_172515_433

The VPN (Virtual Private Network) server provides the network technology that will allow us to extend the reach capabilities of our local network over the Internet, a great example of this would be the possibility for two branches to communicate using the internet as the sole means.

from https://is.gd/9h1dpn

Selected by Galigio via Computer Borders

How To Download All The Data That Google Has On You by https://is.gd/jzuEd0

Google runs lots of different systems, and they all store data about you. There’s the search engine itself, of course, which knows what you’ve been looking for on the web. Then there’s Youtube, Blogger, Calendar, your Google Drive, Hangouts, Gmail and more.

If you want to download a copy of all the data about you that’s held on Google’s servers, it’s actually surprisingly easy.

from https://is.gd/jzuEd0

Selected by Galigio via Computer Borders