How to configure custom SSH connections to simply remote access.
Just a bit of ssh help.
Sometimes it's good to get your info on your own time, from a different source, and in longer form. Here are some great cybersec podcasts (clearancejobs.com)
Hey, are you missing a text, perhaps from Valentine's Day?
A boatload of people got them this morning.
It was across all carriers and allegedly involved 'a third party'.
About those people who lost someone between this morning and V-day.....
So those genetic databases you use to find out your ancestor was Trotsky?
Don't look now, but police just got a warrant to search the database.
Everybody repeat after me: I told you so.
I took so much crap over this from so many, including other security people, plus the indignant who showed me the terms of the signup. This is a smaller database - just wait for the bigger ones, if it hasn't already started.
A breach at an eye clinic exposes the information of 20,000 patients.
Can't these people see what they're doing?
You're gonna love this: specially crafted ZIP files used to bypass secure email gateways. The ZIP file was larger than the uncompressed file.
How bout that Ring video doorbell?
Attackers can now steal your wifi password. Can you say "unprotected wireless access point?" I knew you could. This is an absolutely idiotic flaw. Do drunk monkeys design these things?
Remember: stealing passwords is almost as bad as putting up insecure IoT goodies. And when I say insecure, I mean all of them.
IT news, malware, virii, trojans (both kinds), generalized IT sarcasm, 2nd ugliest blog on the net, vaguely related to ThermionicEmissions
Subscribe to:
Post Comments (Atom)
Corona Malware
This blog has been suspended for a bit because it's practicing social distancing. Or no one reads it. Or I'm too lazy. Or the str...
-
Crafty Web Skimming Domain Spoofs “https” What WHO calling the coronavirus outbreak a pandemic means it means more headlines to bea...
-
Microsoft delivers emergency patch to fix wormable Windows 10 flaw Modern RAM used for computers, smartphones still vulnerable to...
-
The Internet of Things is a security nightmare reveals latest real-world analysis: unencrypted traffic, network crossover, vulnerable OS...
No comments:
Post a Comment