Tag Archives: infosec

How to Spring Clean Your Digital Clutter to Protect Yourself by https://is.gd/x8RFXN

You’re using strong and unique passwords. You’re on the lookout for phishing emails. And you’ve set up two-factor authentication on every account that offers it. Basically, you’re acing Personal Cybersecurity 101.

But with new threats popping up all the time, you may be looking for other proactive steps you can take to protect yourself. Here’s an easy one: Clean up your digital junk.

from https://is.gd/x8RFXN

Selected by Galigio via Computer Borders

That Nasty Samba Vulnerability Is Now Patched in All Supported Ubuntu Releases by https://is.gd/suMzeI

that-nasty-samba-vulnerability-is-now-patched-in-all-supported-ubuntu-releases

You might have read the news this morning about a wormable code-execution bug discovered in the Samba free software re-implementation of the SMB/CIFS networking protocol, which existed in Samba for more than 7 years.

The Samba team managed to quickly patch the critical vulnerability that was discovered to affect over a hundred thousand Linux and UNIX machines running Samba, which is usually used to provide file and printing sharing services, allowing users to connect to Windows shares on a network.

The Samba 4.6.4, 4.5.10 and 4.4.14 patched versions have been released, and are available for download from the official website or via ours if you want to compile it on your GNU/Linux distribution. Canonical already patched Samba in all supported Ubuntu releases, and other GNU/Linux distributions will soon receive the patch.

from https://is.gd/suMzeI

Selected by Galigio via Computer Borders

Hands On With Google And Microsoft Authenticator Apps by https://is.gd/74oK1a

One of the primary vehicles used by bad guys to access our systems is stealing log-in credentials in order to impersonate real users. All the security processes and tools in the world are circumvented when someone has your username and password.

That’s where two-factor authentication (2FA) comes into play. 2FA works by adding another authentication challenge to the equation. It’s not just about what you know – your password, it’s also about something you have. That’s where the authenticator apps from Microsoft and Google come into play.

from https://is.gd/74oK1a

Selected by Galigio via Computer Borders

Debian GNU/Linux 9 “Stretch” to Ship with a Bunch of Digital Forensics Tools by https://is.gd/N7DBub

debian-gnu-linux-9-stretch-to-ship-with-a-bunch-of-digital-forensics-tools

Debian developer Michael ‘mika’ Prokop announced today that he’s team over at Debian Forensics will include and maintain a bunch of digital forensics tools, along with their dependencies, in the upcoming Debian GNU/Linux 9 “Stretch” release.

from https://is.gd/N7DBub

Selected by Galigio via Computer Borders

Fake Apps Pose New Phishing Threat by https://is.gd/UsnPS3

Phishing (i.e., fake, malicious email) doesn’t always get a lot of respect. At a time when the world is focused on “zero days,” cyber “weapons” and “kinetic” cyber attacks on the power grid, the very concept of phishing emails seems decidedly old-fashioned, almost second-rate.

In reality, however, phishing continues to pose one of the top threats to businesses and consumers the world over.

from https://is.gd/UsnPS3

Selected by Galigio via Computer Borders

11 year old boy hacks Bluetooth devices using Raspberry Pi by https://is.gd/Iii0q4

An audience of security experts attending a cybersecurity conference at the World Forum in The Hague (The Netherlands) on Tuesday were shocked when a demonstration done by an 11-year-old “cyber ninja” showed the dismal cyber security standards that are prevailing in technology.

from https://is.gd/Iii0q4

Selected by Galigio via Computer Borders

Linux and Other Open Source Technologies Protect Online Privacy: Snowden by https://is.gd/PlAzLb

uqg6rtn

Edward Snowden, the whistleblower who is living in exile since 2013 when he uncovered NSA’s surveillance operations. However, the tech world’s robin hood makes quite a few virtual appearances and gives his views on the state of privacy.

Snowden’s latest Q&A interaction happened with OpenStack Foundation’s COO Mark Collier over a video conference call during the OpenStack Summit. Snowden emphasized that premium cloud platform and proprietary software are a dent on people’s privacy.

from https://is.gd/PlAzLb

Selected by Galigio via Computer Borders

Murdoch Seeks to Dent Google’s Ad Dominance After YouTube Revolt by https://is.gd/6BbXP9

Rupert Murdoch is hoping that Google‘s pain might be his gain.

Murdoch’s News Corp. is introducing a service that it says can ensure online ads don’t appear next to fake news or offensive videos, marking the latest salvo in the billionaire media mogul’s long battle with the world’s biggest search engine.

from https://is.gd/6BbXP9

Selected by Galigio via Computer Borders

Your smart TV’s privacy policy explained by https://is.gd/csR4Pe

Let’s be honest here — most of us don’t read the privacy policies for smart televisions. And even if we try to, it’s often difficult to read them, particularly on a television screen. Some televisions even display the massive policies five lines at a time.

from https://is.gd/csR4Pe

Selected by Galigio via Computer Borders

What you need to know about the privacy of the new smart camera Amazon wants you to put in your bedroom by https://is.gd/rTqna4

Amazon’s newest version of its Echo smart-home device, the Look, boasts a built-in video camera that can capture your outfits and provide fashion recommendations.

That’s a big step toward a lifestyle of the future.

But it also creates some important privacy issues that are worth keeping in mind if you’re considering buying the $199 Echo Look.

from https://is.gd/rTqna4

Selected by Galigio via Computer Borders