How Hackers Hid a Money-Mining Botnet in Amazon’s Cloud
Hackers have long used malware to enslave armies of unwitting PCs, but security researchers Rob Ragan and Oscar Salazar had a different thought: Why steal computing power from innocent victims when...
View ArticleResearch Shows Increase in Internet Filtering and Usage of FireChat App in Iraq
Researchers at Citizen Lab have taken a close look at the extent of Internet filtering in Iraq, as well as the security of a popular offline chat app used there, and found an increase in the number of...
View ArticlePhony Googlebots Becoming a Real DDoS Attack Tool
Phony Googlebots are being used with greater frequency to launch and carry out application-layer denial-of-service attacks.
View ArticleThe App I Used to Break Into My Neighbor’s Home
When I broke into my neighbor’s home earlier this week, I didn’t use any cat burglar skills. I don’t know how to pick locks. I’m not even sure how to use a crowbar. It turns out all anyone needs to...
View ArticleGauntlt – Security Testing Framework For Developers & Ops
Gauntlt provides hooks to a variety of security tools and puts them within reach of security, dev and ops teams to collaborate to build rugged software. It is built to facilitate testing and...
View ArticleLinux containers made easy
In the past I have praised FreeBSD for having a built-in feature called jails. A jail, in the BSD realm, is a type of virtualization or isolation technology which is about halfway between a full...
View ArticleResources for learning about computer forensics
Sifting-through-the-wreckage asks: I’ve been seeing forensic distributions being announced or updated recently. At work I’ve installed SIFT Linux from the SANS Institute. I’m far from an expert but it...
View Article
More Pages to Explore .....