Cybersecurity

Security Tools to Check for Viruses and Malware on Linux | Linux.com

https://www.linux.com/learn/intro-to-linux/2017/9/security-tools-check-viruses-and-malware-linux Wait, Linux needs antivirus and anti-malware solutions? I thought it was immune to such things. Perhaps a bit of clarification is necessary here. First and foremost, no operating system is 100 percent immune to attack.  Whether you need an antivirus or anti-malware scanner or a tool to hunt for rootkits, Linux has you covered.

Store Your Sensitive Data Safely When Sharing a Sketch – Arduino Project Hub

https://create.arduino.cc/projecthub/Arduino_Genuino/store-your-sensitive-data-safely-when-sharing-a-sketch-e7d0f0?ref=platform&ref_id=424_recent___&offset=0 Often in your sketch, there is some sensitive data that you’d like to keep private, which could accidentally become public when published on GitHub or when you share your sketch with someone else via URL.This sensitive information may include Wi-Fi network names and passwords, API key, and so on. But now, you can add a

Kali Linux 2017.2 Security OS Released With New Hacking Tools

https://www.techworm.net/2017/09/kali-linux-2017-2-security-os-released-new-hacking-tools-download-now.html If you are a hacker, pentester, or a security researcher, this news should interest you. The best Linux OS, Kali Linux 2017.2  was released yesterday. Kali Linux is available for both 32-bit and 64-bit versions. The new Kali Linux distro version comes with more 20 new hacking tools.  Get the latest Kali 2017.2 from Kali download page.

Future cyber security threats and challenges: Are you ready for what’s coming? | CSO Online

https://www.csoonline.com/article/3226392/security/future-cyber-security-threats-and-challenges-are-you-ready-for-whats-coming.html?_lrsc=83557c1d-a1a2-4e91-a200-fe1c9f71d03f The world is changing, and with it so is the internet. Or perhaps it’s the other way around. The internet continues to create new business and social opportunities that massively scale and widely interconnect. The increasing depth and volume of personal and corporate data make it a more rewarding target for cyber crooks and

World Wide Web Consortium abandons consensus, standardizes DRM with 58.4% support, EFF resigns / Boing Boing

https://boingboing.net/2017/09/18/antifeatures-for-all.html In July, the Director of the World Wide Web Consortium overruled dozens of members’ objections to publishing a DRM standard without a compromise to protect accessibility, security research, archiving, and competition. EFF appealed the decision, the first-ever appeal in W3C history. 58.4% of the group voted to go on with publication, and the W3C did so today. It

Secure Your Raspberry Pi Against Attackers

https://makezine.com/2017/09/07/secure-your-raspberry-pi-against-attackers/ Raspberry Pi boards are fantastic for any project — they’re cheap, easy to use, can run a wide range of possible operating systems, and provide programmable GPIO pins as well as multi-core CPU availability and multiple USB ports. You can use Raspberry Pi boards for all kinds of automation and information gathering projects. But,

This Giant Infographic Compares Bitcoin, Ethereum, and Other Major Cryptocurrencies

http://www.visualcapitalist.com/comparing-bitcoin-ethereum-cryptos/ Unless you’ve been hiding under a rock, you’re probably aware that we’re in the middle of a cryptocurrency explosion. In one year, the value of all currencies increased a staggering 1,466% – and newer coins like Ethereum have even joined Bitcoin in gaining some mainstream acceptance. A major problem still exists for the layman: it’s

Bluetooth Vulnerability Affects All Major OS

https://hackaday.com/2017/09/14/bluetooth-vulnerability-affects-all-major-os/ Turn off your Bluetooth! I checked that mine was turned off after reading this: Security researchers from Armis Labs recently published a whitepaper unveiling eight critical 0-day Bluetooth-related vulnerabilities, affecting Linux, Windows, Android and iOS operating systems. These vulnerabilities alone or combined can lead to privileged code execution on a target device. The only requirement is:

Bitcoin info graphic

Bitcoin is a worldwide cryptocurrency and digital payment system called the first decentralized digital currency. It was released as open-source software in 2009.The system is peer-to-peer, and transactions take place between users directly, without an intermediary.These transactions are verified by network nodes and recorded in a public distributed ledger called a blockchain. On 1 August