Tag Archives: Cybersecurity

New Persirai botnet uses exploit to infect 120,000+ connected cameras by https://is.gd/E4uFRO

figure-1-01-1024x699

Another day, another Internet of Things botnet. This time, a new botnet discovered in the wild is believed to have infected over 120,000 Internet-connected cameras.Dubbed Persirai by researchers at Trend Micro Inc., the botnet is targeting more 1,000 Internet Protocol camera models from various off-brand producers.

from https://is.gd/E4uFRO

Selected by Galigio via Computer Borders

That Nasty Samba Vulnerability Is Now Patched in All Supported Ubuntu Releases by https://is.gd/suMzeI

that-nasty-samba-vulnerability-is-now-patched-in-all-supported-ubuntu-releases

You might have read the news this morning about a wormable code-execution bug discovered in the Samba free software re-implementation of the SMB/CIFS networking protocol, which existed in Samba for more than 7 years.

The Samba team managed to quickly patch the critical vulnerability that was discovered to affect over a hundred thousand Linux and UNIX machines running Samba, which is usually used to provide file and printing sharing services, allowing users to connect to Windows shares on a network.

The Samba 4.6.4, 4.5.10 and 4.4.14 patched versions have been released, and are available for download from the official website or via ours if you want to compile it on your GNU/Linux distribution. Canonical already patched Samba in all supported Ubuntu releases, and other GNU/Linux distributions will soon receive the patch.

from https://is.gd/suMzeI

Selected by Galigio via Computer Borders

Fake Apps Pose New Phishing Threat by https://is.gd/UsnPS3

Phishing (i.e., fake, malicious email) doesn’t always get a lot of respect. At a time when the world is focused on “zero days,” cyber “weapons” and “kinetic” cyber attacks on the power grid, the very concept of phishing emails seems decidedly old-fashioned, almost second-rate.

In reality, however, phishing continues to pose one of the top threats to businesses and consumers the world over.

from https://is.gd/UsnPS3

Selected by Galigio via Computer Borders

11 year old boy hacks Bluetooth devices using Raspberry Pi by https://is.gd/Iii0q4

An audience of security experts attending a cybersecurity conference at the World Forum in The Hague (The Netherlands) on Tuesday were shocked when a demonstration done by an 11-year-old “cyber ninja” showed the dismal cyber security standards that are prevailing in technology.

from https://is.gd/Iii0q4

Selected by Galigio via Computer Borders

Your smart TV’s privacy policy explained by https://is.gd/csR4Pe

Let’s be honest here — most of us don’t read the privacy policies for smart televisions. And even if we try to, it’s often difficult to read them, particularly on a television screen. Some televisions even display the massive policies five lines at a time.

from https://is.gd/csR4Pe

Selected by Galigio via Computer Borders

What you need to know about the privacy of the new smart camera Amazon wants you to put in your bedroom by https://is.gd/rTqna4

Amazon’s newest version of its Echo smart-home device, the Look, boasts a built-in video camera that can capture your outfits and provide fashion recommendations.

That’s a big step toward a lifestyle of the future.

But it also creates some important privacy issues that are worth keeping in mind if you’re considering buying the $199 Echo Look.

from https://is.gd/rTqna4

Selected by Galigio via Computer Borders

How to Enable/Disable ‘Location Tracking’ on ‘Opera’ browser? by https://is.gd/1vhof9

Opera Browser

A brief but effective tutorial about Enabling and/or Disabling ‘Location Tracking’ on ‘Opera’ browser.

from https://is.gd/1vhof9

Selected by Galigio via Computer Borders