Full Article : ZDNet – Security – http://www.zdnet.com/article/after-oracle-weblogic-miner-attack-critical-apache-solr-bug-is-now-targeted/#ftag=RSSbaffb68 Money-hungry hackers have used over 1,400 unpatched Apache Solr servers to install a cryptocurrency miner.
Full Article : ZDNet – Security – http://www.zdnet.com/article/cryptojacking-attack-uses-leaked-nsa-exploit/#ftag=RSSbaffb68 RedisWannaMine is a sophisticated attack which targets servers to fraudulently mine cryptocurrency.
Full Article : ZDNet – Security – http://www.zdnet.com/article/tpp-11-to-take-effect-in-australia-before-end-of-year/#ftag=RSSbaffb68 Trade agreement that covers 500 million people to clear its hurdles in Australia during 2018.
Full Article : ZDNet – Linux – http://www.zdnet.com/article/linux-beats-internal-legal-threat/#ftag=RSSbaffb68 Linux has beaten many legal challenges over the years, but until now, it hasn’t had to win a battle over one of its own.
Full Article : Datamation – https://www.datamation.com/cloud-computing/cloud-vs.-on-premise-software-the-cloud-debate.html Cloud-based applications are becoming more popular, but that doesn’t mean they are the best fit for every organization or every situation.
Full Article : ZDNet – Security – http://www.zdnet.com/article/source-defense-says-it-has-a-fix-for-the-one-vulnerability-that-can-compromise-almost-any-website/#ftag=RSSbaffb68 The Israeli startup has a new solution to secure against vulnerabilities from third party plugins–and improve page load speeds at the same time.
Full Article : ZDNet – Security – http://www.zdnet.com/article/mcafee-buys-tunnelbear-makers-of-a-consumer-vpn-app/#ftag=RSSbaffb68 McAfee plans to embed TunnelBear’s “hardened network” into its Safe Connect product.
Full Article : ZDNet – Security – http://www.zdnet.com/article/cisco-update-now-to-fix-critical-hardcoded-password-bug-remote-code-execution-flaw/#ftag=RSSbaffb68 Cisco patches two serious authentication bugs and a Java deserialization flaw.
Full Article : ZDNet – Security – http://www.zdnet.com/article/this-new-trojan-malware-uses-leaked-source-code-of-legit-software-to-snoop-on-you/#ftag=RSSbaffb68 FlawedAmmyy campaign is thought to be the work of a prolific hacking group that has been distributing the malware via phishing emails.
Full Article : ZDNet – Security – http://www.zdnet.com/article/windows-security-microsoft-fights-massive-cryptocoin-miner-malware-outbreak/#ftag=RSSbaffb68 Microsoft blocks a malware outbreak that could have earned big bucks for one criminal group.
Full Article : ZDNet – Security – http://www.zdnet.com/article/memcached-ddos-this-kill-switch-can-stop-attacks-dead-in-their-tracks/#ftag=RSSbaffb68 Researchers find a technique to contain the memcached amplification attacks seen over the past week.
Full Article : ZDNet – Security – http://www.zdnet.com/article/cybersecurity-and-brexit-what-does-it-mean-for-the-fight-against-hackers/#ftag=RSSbaffb68 Brexit could mean new challenges in the fight against cybercrime, from changes to international police agencies and more headaches for companies recruiting security staff.
Full Article : ZDNet – Security – http://www.zdnet.com/article/binance-cryptocurrency-sell-off-disaster-blamed-on-mass-phishing-campaign/#ftag=RSSbaffb68 A long-term phishing campaign and a timed attack appear to be at the heart of unauthorized cryptocurrency trading.
Full Article : ZDNet – Security – http://www.zdnet.com/article/facebook-bumps-up-links-to-https-to-boost-online-security/#ftag=RSSbaffb68 The platform’s link security infrastructure now includes HSTS preloading.
Full Article : ZDNet – Security – http://www.zdnet.com/article/homeland-security-cybersecurity-is-a-hot-mess-watchdog-report/#ftag=RSSbaffb68 An inspector general audit found dozens of computers across the agency’s networks were running old and outdated software, and in some cases, computers hadn’t received security patches … Read more
Full Article : ZDNet – Security – http://www.zdnet.com/article/android-p-promises-to-double-down-on-privacy/#ftag=RSSbaffb68 Android P could give even the most ardent iPhone fans a run for their money.
Full Article : ZDNet – Security – http://www.zdnet.com/article/new-iot-security-rules-stop-using-default-passwords-and-allow-software-updates/#ftag=RSSbaffb68 New rules set out best practice for IoT devices, but are the makers going to listen?
Full Article : ZDNet – Security – http://www.zdnet.com/article/chrome-65-rolls-out-youre-getting-a-stronger-redirect-blocker-45-security-fixes/#ftag=RSSbaffb68 Chrome 65 rounds out Google’s long-running efforts to stamp out unwanted redirects.
Full Article : ZDNet – Security – http://www.zdnet.com/article/open-source-exim-remote-attack-bug-400000-servers-still-vulnerable-patch-now/#ftag=RSSbaffb68 Many hosts running popular open-source email service Exim are still open to a remote code execution bug.
Full Article : ZDNet – Security – http://www.zdnet.com/article/banking-trojan-turns-to-dark-cloud-botnet-to-spread-malware-further/#ftag=RSSbaffb68 Botnet distribution added to attacks which are crafted to hijack email threads – by attackers who are now experimenting with also delivering crytpocurrency mining malware.
Full Article : ZDNet – Security – http://www.zdnet.com/article/datacentre-security-techniques-transferable-to-iot-cisco/#ftag=RSSbaffb68 The networking giant says because it is good at securing datacentre traffic, it can do the same for Internet of Things devices.
Full Article : ZDNet – Security – http://www.zdnet.com/article/pentagon-using-googles-tensorflow-apis-to-analyze-drone-footage/#ftag=RSSbaffb68 Google acknowledges “military use of machine learning naturally raises valid concerns” but says this project “is for non-offensive uses only.”
Full Article : Datamation – https://www.datamation.com/cloud-computing/slideshows/top-12-saas-apps-for-enterprises.html These cloud-based ERP, CRM, office productivity and other types of enterprise software power modern organizations.
Full Article : ZDNet – Security – http://www.zdnet.com/article/new-documents-reveal-fbi-paid-geek-squad-repair-staff-as-informants/#ftag=RSSbaffb68 A freedom of information request revealed that the FBI used the Best Buy division’s repair staff to flag illegal content.
Full Article : ZDNet – Linux – http://www.zdnet.com/article/debian-kali-linux-distributions-now-available-in-the-microsoft-store/#ftag=RSSbaffb68 Microsoft is making good on its promise from a year ago to make more Linux distributions available from the Microsoft Store for use on Windows 10’s subsystem … Read more