Microsoft Surface Pro 4 review – CNET

Fall ’16 update

After years of development and millions of advertising dollars spent to convince us that a tablet could plausibly replace a laptop, Microsoft finally delivered the goods with the Surface Pro 4.

Fall ’16 update

After years of development and millions of advertising dollars spent to convince us that a tablet could plausibly replace a laptop, Microsoft finally delivered the goods with the Surface Pro 4. Equipped with robust processing power, a perfectly sized display and just-right aspect ratio, and a few critical add-on accessories, the Pro 4 solidified the Surface’s position as the gold standard for Windows tablets. And with the arrival of Windows 10 in July 2015, that which blemished all previous Surface models — an inelegant operating system — was finally replaced by a solid OS that could fulfill the potential of its form factor.

Continue reading “Microsoft Surface Pro 4 review – CNET”

What’s the Fix for IoT DDoS Attacks?

DynDNS (or just Dyn now) got blasted with #DDoS twice last Friday. Since Dyn is the major DNS provider for Twitter, Github, and Spotify, the knock-on effects have had a global reach.

DynDNS (or just Dyn now) got blasted with #DDoS twice last Friday. Since Dyn is the major DNS provider for Twitter, Github, and Spotify, the knock-on effects have had a global reach. Here’s a rather comical exchange among typical users scratching their heads Friday morning:

Continue reading “What’s the Fix for IoT DDoS Attacks?”

“Celebgate” Hacker Sentenced to 18 Months in Prison

Ryan Collins, 36, of Lancaster, Pennsylvania, was sentenced to prison on Wednesday for hacking into over 100 online accounts, including many belonging to celebrities. Private pictures and videos stolen from these accounts were later leaked online in what became known as “The Fappening” or “Celebgate.

Ryan Collins, 36, of Lancaster, Pennsylvania, was sentenced to prison on Wednesday for hacking into over 100 online accounts, including many belonging to celebrities. Private pictures and videos stolen from these accounts were later leaked online in what became known as “The Fappening” or “Celebgate.”

Continue reading ““Celebgate” Hacker Sentenced to 18 Months in Prison”

Japan Targeted in “Blackgear” Espionage Campaign

The threat actor behind a cyber espionage campaign that has been known to target users in Taiwan has recently set sights on Japan, according to researchers at Trend Micro.

The campaign, dubbed “Blackgear” by Trend Micro, involves a piece of malware tracked by several security firms as “Elirks.

The threat actor behind a cyber espionage campaign that has been known to target users in Taiwan has recently set sights on Japan, according to researchers at Trend Micro.

Continue reading “Japan Targeted in “Blackgear” Espionage Campaign”

Office 2013 Gets Macro-Blocking Feature

Microsoft this week announced boosted customer security with a new feature in Office 2013: the ability to block risky macros.

The new functionality is Microsoft’s response to the growing trend of macro-abusing malware assaulting users worldwide and is meant to render corporate networks safer from such threats.

Microsoft this week announced boosted customer security with a new feature in Office 2013: the ability to block risky macros.

Continue reading “Office 2013 Gets Macro-Blocking Feature”

Cisco Patches 9 Flaws in Email Security Appliance

Cisco announced on Wednesday that it has released software updates for its Email Security Appliances (ESA) to address a total of nine vulnerabilities, including denial-of-service (DoS) and filter bypass issues.

Cisco announced on Wednesday that it has released software updates for its Email Security Appliances (ESA) to address a total of nine vulnerabilities, including denial-of-service (DoS) and filter bypass issues.

Continue reading “Cisco Patches 9 Flaws in Email Security Appliance”

Data Leaked by Pagers Useful for Critical Infrastructure Attacks

Pagers are still used in industrial environments and many organizations don’t realize that the messages sent with these devices can be highly useful to malicious actors looking to launch a targeted attack.

Pagers are still used in industrial environments and many organizations don’t realize that the messages sent with these devices can be highly useful to malicious actors looking to launch a targeted attack.

Continue reading “Data Leaked by Pagers Useful for Critical Infrastructure Attacks”

Hackers Could Harm Diabetics via Insulin Pump Attacks

OneTouch Ping insulin pumps manufactured by Johnson & Johnson-owned Animas are plagued by several vulnerabilities that can be exploited by remote hackers to compromise devices and potentially harm the diabetic patients who use them.

OneTouch Ping insulin pumps manufactured by Johnson & Johnson-owned Animas are plagued by several vulnerabilities that can be exploited by remote hackers to compromise devices and potentially harm the diabetic patients who use them. While the security holes are serious, the risk is considered relatively low and the vendor does not plan on releasing a firmware update.

Continue reading “Hackers Could Harm Diabetics via Insulin Pump Attacks”

Bulk surveillance review is ‘fiction’, claims former NSA technical director

Why GCHQ should focus on targeted interception

Targeted collection of data, based on probable cause, is a more effective way of detecting and preventing terrorism and serious crime, said Binney.

At the NSA, Binney was responsible for the first internet surveillance programme, codenamed ThinThread, which used sophisticated analytical techniques to identify and capture internet behaviour that fell into a “zone of suspicion”.

Why GCHQ should focus on targeted interception

Targeted collection of data, based on probable cause, is a more effective way of detecting and preventing terrorism and serious crime, said Binney.

Continue reading “Bulk surveillance review is ‘fiction’, claims former NSA technical director”

Researchers Break Encryption of MarsJoke Ransomware

The recently discovered MarsJoke ransomware has a encryption weakness that has allowed Kaspersky Lab security researchers to create a decryptor and help users restore their files for free.

Spotted for the first time in late August, the ransomware family gained attention last week, when the first large-scale spam distribution campaign was spotted.

The recently discovered MarsJoke ransomware has a encryption weakness that has allowed Kaspersky Lab security researchers to create a decryptor and help users restore their files for free.

Continue reading “Researchers Break Encryption of MarsJoke Ransomware”