16 technology websites every IT pro should bookmark
https://www.miradore.com/16-best-technology-websites-every-it-pro-should-bookmark/?utm_source=facebook&utm_medium=social&utm_campaign=blog This is a good list of IT sites worth to follow. →
https://www.miradore.com/16-best-technology-websites-every-it-pro-should-bookmark/?utm_source=facebook&utm_medium=social&utm_campaign=blog This is a good list of IT sites worth to follow. →
http://motherboard.vice.com/read/the-worst-hacks-of-2016 This article takes a look at the biggest computer security incidents that were in the news in 2016. →
http://www.computerworld.com/article/2475789/cybercrime-hacking/hackers-exploit-scada-holes-to-take-full-control-of-critical-infrastructure.html Many systems controlling critical infrastructure are vulnerable. →
http://www.pcworld.com/article/3156931/linux/why-malware-should-be-a-concern-for-all-linux-users-and-what-to-do-about-it.html Malware problem is just not for Windows… →
http://www.ibtimes.co.uk/mirai-botnet-creator-anna-senpai-unmasked-ddos-protection-service-provider-gone-rogue-1601935 If this is true then this Mirai botnet story is a part of quite strange business plan that did not go as planned. Cyber security in 2016/2017 is full of strange stories – some true, some fake and most hard to prove. →
Recently, the media has been on discussion on making the country roads to be controlled by private company and Finnish cars envisaged the so-called mandatory. black box. On this discussion it has been several times mentioned that the Finnish Government has planned a mandatory monitoring devices for all cars to collect “road tax” based on →
https://www.tripwire.com/state-of-security/security-awareness/fraudsters-hack-audio-recordings-conduct-social-engineering-attacks/ Advanced audio processing tools can be used for good and bad. →
https://www.theguardian.com/technology/2017/jan/10/browser-autofill-used-to-steal-personal-details-in-new-phising-attack-chrome-safari →
https://www.scmagazine.com/debugging-mechanism-in-intel-cpus-allows-seizing-control-via-usb-port/article/630480/ Some Intel CPUs have JTAG over USB 3 debugging built-in. This could be good for debugging but is really bad for computer security. “starting with the Skylake processor family in 2015, Intel introduced the Direct Connect Interface (DCI) which provides access to the JTAG debugging interface via common USB 3.0 ports.” Having the DCI →
http://www.csoonline.com/article/3155572/internet-of-things/john-mcafees-3-major-cybersecurity-predictions-for-2017.html Cybersecurity predictions: 1. IoT denial of service attacks on major Internet carriers will become commonplace 2. The anti-virus paradigm will finally been seen as a dead paradigm 3. Intelligence agencies will finally accept the fact that a sophisticated Nation State can perpetrate any hack and make it point to any Nation or agency that →