Remove page m
article thumbnail

Technology Short Take 158

Scott Lowe

See this page for instructions on how to enable BBR on Debian 10. A “highly evasive” Linux malware named OrBit has emerged; see here for more details. I’m not sure I agree with some of his points…but I need to ponder the topic a bit more. Hopefully I’ve managed to find something useful for someone.

Linux 90
article thumbnail

Former Amazon exec inherits Microsoft’s complex cybersecurity legacy in quest to solve ‘one of the greatest challenges of our time’

GeekWire

He absorbed the 477-page technical tome in one weekend and returned to Redmond ready to change how Microsoft made software — prioritizing security and reliability over new features. “I’m confident he’s going to help us build that,” Jakkal said. Bill Gates was one.

Microsoft 106
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Ownership Issues - A Screw's Loose

A Screw's Loose

You still need to spell out the differences in your policy, but instead of an entire 20 pages devoted to BYOD and a strategy that drives people away from using their own devices, you enable them to use them to meet their needs. All in all, I’m enjoying it. Tags Applications. Crapplications. Enterprise Mobility. Innovation.

Mobile 65
article thumbnail

The Hacker Mind Podcast: Crimeware As A Service

ForAllSecure

I’m Robert Vamosi, and in the episode I’m talking about ransomware, and more specifically about the ecosystem of criminal activity that’s been built up around it as we more toward what some are calling crimeware as a service. Vamosi: Ransomware is the latest trend in malware. There is also a growing concern.

Malware 40
article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

Here’s Robert M. They also had a piece of malware called killdisk position on the systems so that when the systems rebooted, it would kick off deleting all the files and deleting all the systems. It was a masterful piece of malware, carefully crafted to achieve a specific goal. When they did that.

System 52
article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

I’m going to be talking a lot about OSINT throughout this episode. And so I thought, well, yeah, well, we figured out how he, you know, defaced a bunch of web pages. Let's analyze malware. And they all had I found their like, MySpace page where they were a rap, a rap crew, you know, they had their own rap gang.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

I’m talking about the totality of the voting system. I am 11 years old, I'm 11 years old seven years old, 11 years old" These kids managed to manipulate replicas of election night results pages in key battleground states from 2016, pages built organizers say using actual vulnerabilities previously reported.

System 52