Security: Updates, FUD, Back Doors and More
-
Security updates for Tuesday
-
Sting Catches Another Ransomware Firm — Red Mosquito — Negotiating With “Hackers”
ProPublica recently reported that two U.S. firms, which professed to use their own data recovery methods to help ransomware victims regain access to infected files, instead paid the hackers.
Now there’s new evidence that a U.K. firm takes a similar approach. Fabian Wosar, a cyber security researcher, told ProPublica this month that, in a sting operation he conducted in April, Scotland-based Red Mosquito Data Recovery said it was “running tests” to unlock files while actually negotiating a ransom payment. Wosar, the head of research at anti-virus provider Emsisoft, said he posed as both hacker and victim so he could review the company’s communications to both sides.
Red Mosquito Data Recovery “made no effort to not pay the ransom” and instead went “straight to the ransomware author literally within minutes,” Wosar said. “Behavior like this is what keeps ransomware running.”
-
Carbon Black adds Linux support and more to its endpoint protection solution
Endpoint protection company Carbon Black is adding a number of features to its platform, including Linux support and Amazon Web Services and container protection.
The cloud-native platform gives security and IT teams remote access to cloud workloads and containers running in their environment, making it easier to resolve configuration drift, address vulnerabilities in real time, confidently respond to incidents and demonstrate compliance with business policies and industry regulations.
The cloud workload and container protection capabilities are available from the same universal agent and cloud-native platform protecting Microsoft Windows, macOS and Linux endpoints.
"The industry is quickly moving into the cloud era for endpoint protection and IT operations," says Ryan Polk, Carbon Black's chief product officer. "Carbon Black is proud to be at the front edge for cloud innovation and, with this latest release, our cloud-native EPP is now protecting some of the most important and emerging cloud real estate."
As well as supporting AWS workloads and nearly every Linux distribution released since 2011, Carbon Black's platform extends direct access to more than 1,000 individual system artifacts across all major operating systems, including the ability to check the status of disk encryption, installed applications, kernel integrity, listening network ports, logged in users, OS versions, USB devices and more.
-
Top 10 Ethical Hacking Books
Hacking is an ongoing process of information gathering and exploitation of any target. The hackers are consistent, practical and stay updated with daily appearing vulnerabilities. The first step to exploitation is always reconnaissance. The more information you gather, the better there are chances that you will make your way through the victim boundary. The attack should be very structured and verified in a local environment before being implemented on live target. The pre requisites are Networking skills, programming languages, Linux, Bash scripting and a reasonable workstation.Ethical hacking is the application of hacking knowledge for the benefit of society through good morals, and is usually defensive in nature, based on good knowledge of the core principles.
Many books are available on hacking, but we will discuss today the top 10 which are appreciated and recommended by the hacking community. Note: The books are in no particular order. -
Raspberry Pi used to steal data from Nasa lab [Ed: RasPi has a major new release (4), so MSBBC needs to spread some negative things/stories about it (googlebombing?). Microsoft failed to take over Raspberry Pi Foundation like it did OLPC. BBC (run by ex-Microsoft UK people) spreads anti-RasPi news belatedly (blaming it for something unrelated) only hours after a major product release.]
A tiny Raspberry Pi computer has been used to steal data from Nasa's Jet Propulsion Laboratory, the space agency has revealed.
An audit report reveals the gadget was used to take about 500MB of data.
-
VMware’s Dirk Hohndel On Container Security, Mental Health And Open Source
-
Trump Ponders Banning All Chinese-Made Gear From US 5G Networks [Ed: Mandating NSA back doors everywhere]
We've already noted extensively how the "race to fifth generation wireless (5G)" is kind of a dumb thing. While 5G is important in the way that faster, better networks are always important, the purported Earth-rattling benefits of the technology have been painfully over-hyped. And they've been painfully over-hyped largely for two reasons: one, mobile carriers want to give a kick to stalling cellphone sales numbers, and network hardware vendors like Cisco want to drive the adoption of new, more expensive, telecom hardware.
The "race to 5G" isn't a race. And even if it were, our broadband maps are so intentionally terrible, we'd have no idea if and when we'd won it. Regardless, 5G has subsequently become a sort of magic pixie dust of tech policy conversations, justifying all manner of sometimes dubious policy. But the underlying desire to simply sell more kit has also infected the Trump administration's protectionist attacks on companies like Huawei, which is based on about 40% actual cybersecurity concerns, and 60% lobbying efforts by US hardware vendors that don't want to compete with cheaper Chinese hardware.
- Login or register to post comments
- Printer-friendly version
- 2346 reads
- PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
digiKam 7.7.0 is releasedAfter three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. |
Dilution and Misuse of the "Linux" Brand
|
Samsung, Red Hat to Work on Linux Drivers for Future TechThe metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. |
today's howtos
|
Recent comments
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago