“Social media-enabled cybercrimes are generating at least $3.25 billion in global revenue annually according to a new report.”
Tag Archives: Cybersecurity
Hacks to Secure Your Data in Cloud by https://ift.tt/2U4bP9a
“For the digital era, the cloud has proved to be a huge blessing. It enables storing large amounts of information — photos, videos, music, messages, etc. with a limited budget. With the dawn of the Internet, backing up data became much easier by storing it on the server rather than a hard drive.”
5 Methods to Generate a Random Password from the Command Line by https://www.putorius.net/
“If it was up to me I would never leave the command line. I use still use lynx (a command line browser), dict (a command line dictionary), and bc (a command line calculator) although with decreasing regularity. So why not use the command line to generate random passwords?”
We all understand the risk of someone taking over our computers or phones for nefarious purposes. But remote access to printers and fax machines was something most people took a little less seriously. After all, you might get some obscene printouts or someone wasting some paper, but in general, those are not big deals. Some researchers however have lately been pondering what might happen should someone break into your 3D printer. Of course, you could bring a printer down to deny service, or cause things to malfunction — maybe even in ways that could be dangerous if the printer didn’t …read more
via 3D Printing, Cybersecurity, and Audio Fingerprinting — Hackaday
China says it has new surveillance camera technology that can recognise you just from how you walk by https://ift.tt/2F3X4jG

China has rolled out surveillance software in Beijing and Shanghai which authorities say can identify people from their walking style, even with their backs turned and faces hidden.
Selected by Galigio via Computer Borders
China says it has new surveillance camera technology that can recognise you just from how you walk by https://ift.tt/2F3X4jG

China has rolled out surveillance software in Beijing and Shanghai which authorities say can identify people from their walking style, even with their backs turned and faces hidden.
Selected by Galigio via Computer Borders
Google’s Selfish Ledger Is An Unsettling Vision Of Social Engineering by https://ift.tt/2GKGGQQ
Google’s multibillion-dollar business was built by collecting all the information available to its users. Selfish Ledger is a video produced by Google that offers a stunningly ambitious and unsettling perception of how some people at the company envision to use that information in the future.
Selected by Galigio via Computer Borders
Opera now protects you from cryptojacking attacks by https://is.gd/kA4S26
Opera today launched version 50 of its desktop browser. Sadly, this release doesn’t come with a cake to celebrate this milestone (not even a tiny cupcake), but the newest release does include a new feature that makes sure that nobody can mine crytocurrencies in your browser.
In Opera, this new cryptojacking feature is automatically enabled when you turn on the browser’s ad blocking tool.
from https://is.gd/kA4S26
Selected by Galigio via Computer Borders
How To Use VeraCrypt On Linux by https://is.gd/HFNBWZ
For years, TrueCrypt was the encryption tool of choice for Linux users. It worked well, and it did everything you could ever want. Then one day, the project was discontinued. Ever since then, Linux users have been scrambling to find an encryption tool that works as well.
For most, the best tool to use is VeraCrypt. The main reason that VeraCrypt stands out from the rest of the new encryption tools is that it is a “fork” from the old TrueCrypt code. This means if you’ve used TrueCrypt for years but want something that is actively maintained, you can install VeraCrypt on Linux and everything will continue to work.
from https://is.gd/HFNBWZ
Selected by Galigio via Computer Borders
5 computer security facts that surprise most people by https://is.gd/4zaJnw
The five statements below are the causes behind a lot of computer security risk and exploits. If you understand them well enough today, you will be ahead of your peers.
from https://is.gd/4zaJnw
Selected by Galigio via Computer Borders






