Month: January 2018

ComputerWorldIndependent

Throwback Thursday: What are the odds?

Credit to Author: Sharky| Date: Thu, 18 Jan 2018 03:00:00 -0800

Internet filter is installed at this site, and in the beginning, there are complaints from users who can’t get to their favorite non-business sites, says an IT pilot fish working there.

But after six months and lots of explanations to users, the complaints have stopped. “Then one Saturday evening, a user called me,” fish says.

“He called to report that something must be wrong, because he could get to his lottery numbers tonight.

“I told him thanks, and that I would inform the individual in charge of the filter on Monday morning, as it wasn’t stopping anything production-critical during the weekend hours.

“I still can’t decide which is funnier: the fact that apparently every day for nearly six months this user tried to get to his lottery numbers even though the page should have never loaded again — or that, when he actually was able to, he reported it as a problem.”

To read this article in full, please click here

Read More
QuickHealSecurity

Beware of fake cryptocurrency mining apps – a report by Quick Heal Security Labs

Credit to Author: Bajrang Mane| Date: Thu, 18 Jan 2018 09:53:22 +0000

Cryptocurrency has become a famous and valuable digital asset. One of the ways to earn cryptocurrencies is to mine them. New coins are generated and brought into the market through the process of mining. Mining of cryptocurrency is a resource-intensive task but mining them on mobile devices is still a…

Read More
IndependentKrebs

Some Basic Rules for Securing Your IoT Stuff

Credit to Author: BrianKrebs| Date: Wed, 17 Jan 2018 19:36:24 +0000

Most readers here have likely heard or read various prognostications about the impending doom from the proliferation of poorly-secured “Internet of Things” or IoT devices. Loosely defined as any gadget or gizmo that connects to the Internet but which most consumers probably wouldn’t begin to know how to secure, IoT encompasses everything from security cameras, routers and digital video recorders to printers, wearable devices and “smart” lightbulbs. Throughout 2016 and 2017, attacks from massive botnets made up entirely of hacked IoT devices had many experts warning of a dire outlook for Internet security. But the future of IoT doesn’t have to be so bleak. Here’s a primer on minimizing the chances that your IoT things become a security liability for you or for the Internet at large.

Read More
FortinetSecurity

Into the Implementation of Spectre

Credit to Author: Axelle Apvrille| Date: Wed, 17 Jan 2018 17:00:59 +0000

In this blog post, we will get into the details of the implementation of Spectre, the exploit that targets the vulnerbilities found in CPUs built by AMD, ARM, and Intel. We assume you are familiar with the concept of the attack, and you can inspect the Proof of Concept source code provided in the Appendix of the paper linked above. You might also find it easier to read this blog post with the source code side by side.

Read More