Dan San

2,522 Flips | 18 Magazines | 2 Likes | 1 Following | 14 Followers | @DanSan2015 | Keep up with Dan San on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Dan San”

The Linux Code of Conduct is long overdue

Why IT and development should follow in Linus Torvalds's footsteps and adopt an always-do-better creed, even if it means stepping away from Linux …

Codes of Conduct

Bug hunters fail third year in a row to get top prize in Android hacking program

Bug hunters earned over $3 million in rewards for security flaws found in the Android OS since 2015.<p>Security researchers have failed to win the top …

Android News

After riches and jail, Belarusian ex-hacker's life lesson? 'Don't steal from Americans. Ever'

ZDNet talks to a former infamous hacker whose "mostly true" book offers a glimpse into the minds of Eastern Europe's cybercriminals.<p>Notorious hacker …

Selling

Is the Linux 4.18 kernel heading your way?

How soon the 4.18 kernel lands on your system or network depends a lot on which Linux distributions you use. It may be heading your way or you may …

Linux

Carnegie Mellon is Saving Old Software from Oblivion

A prototype archiving system called Olive lets vintage code run on today’s computers Illustration: Nicholas Little<b>In early 2010, Harvard economists</b> …

Carnegie Mellon University

How to install PlayOnLinux in Ubuntu Desktop 18.04

If you need to install a Windows desktop app on Linux, your best bet is PlayOnLinux.<p>One of the reasons why some users don't opt for Linux is because …

Command-line

Hackers stole customer credit cards in Newegg data breach

Newegg is clearing up its website after a month-long data breach.<p>Hackers injected 15 lines of card skimming code on the online retailer’s payments page which remained for more than a month between August 14 and September 18, Yonathan Klijnsma, a threat researcher at RiskIQ, told TechCrunch. The …

British Airways

Amazon is facing an EU antitrust probe into its collection of sales data

European regulators are taking a preliminary look at Amazon’s third-party data collection practices as part of an early antitrust probe, European Union officials disclosed today.<p>The EU is “gathering information”<p>Margrethe Vestager, the head of the EU’s competition bureau, said during a press …

European Union

Optimised Ubuntu Desktop images available in Microsoft Hyper-V gallery

Today we’re very pleased to announce that an optimised Ubuntu Desktop image is available from the Hyper-V gallery. This will give an optimum …

Windows 10

State Department confirms breach of unclassified email system

The U.S. State Department confirmed it suffered a data breach that exposed employee data; the breach affected the State Department’s unclassified …

Authentication

The importance of Multi-Factor authentication with the prominence of phishing scams

Phishing scams are one of the largest threats to Office 365 user credentials out there. Why? Well it's one of the easist and yet most effective …

Authentication

Suspects in high profile hotel data breach arrested: Huazhu Group

Police have nabbed suspects attempting to sell nearly 500 million personal information records of clients leaked from China's hotel operator Huazhu, …

News (China)

Singapore to spend $30 million over next 5 years to fund new regional cyber security centre

SINGAPORE - A new centre to train teams of experts who can respond to local and regional cyber security incidents will be fully funded by the …

Cybersecurity

US government payment site leaks 14 million customer records

GovPayNow.com says customers are safe, despite the breach.<p>Government Payment Service Inc -- the company thousands of local governments in the US use to accept online payments for everything from court-ordered fines and licensing fees -- has compromised more than 14 million customer records dating …

Technology

How to list repositories on Linux

A Linux repository is a storage location from which your system retrieves and installs OS updates and applications. Each repository is a collection …

Linux

Websites are attacked 58 times a day, even when patched properly

More than half (55%) of malware infected sites were running on their latest core versions when they were attacked, according to a recent SiteLock …

Social Media

Expandable ads can be entry points for site hacks

Researcher finds XSS vulnerabilities in iframe busters, scripts that power expandable ads that grow and cover a large area of the page.<p>Ads that …

Hacking

Credential stuffing attacks cause heartache for the financial sector

Over 30 billion login attempts using this attack technique have been recorded in less than a year.<p>The financial industry has always been a target for …

Tech Trends

State Department reveals data breach, employee information exposed

The data breach took place due to a compromised email system belonging to the department.<p>The US State Department has confirmed a data breach which …

U.S. State Department

Hackers peddle thousands of air miles on the Dark Web for pocket money

Underground sellers are offering stolen air miles for a fraction of their true cost to the detriment of their true owners.<p>Air miles may seem like an …

Frequent-flyer Programs

Mirai botnet authors avoid prison after "substantial assistance" to the FBI

Mirai botnet authors go from black hats to white hats.<p>The three men who created and ran the original Mirai botnet back in 2016 have avoided prison …

U.S. Department of Justice

This Windows file may be secretly hoarding your passwords and emails

A little-known Windows feature will create a file that stores text extracted from all the emails and plaintext-files found on your PC, which …

Linux eBPF Tracing Tools

Linux Enhanced BPF (eBPF) Tracing Tools<p>This page shows examples of performance analysis tools using enhancements to BPF (Berkeley Packet Filter) …

Computer Science Encyclopedia Can Fill a Gap

Our profession has the credibility and resources to create an Encyclopedia that will serve as the professional standard.

News Media

Overhauling the 3 Pillars of Security Operations

Modern apps and the cloud mean that organizations must now rethink older security practices.

Information Security

FragmentSmack vulnerability also affects Windows, but Microsoft patched it | ZDNet

FragmentStack can drive CPU usage up through the roof, jamming servers bombarded with malformed IP packets. Just the ideal vulnerability for DDoS …

Cyber-attacks

Critical infrastructure will have to operate if there's malware on it or not | ZDNet

Retired US Air Force cyber-security expert shares his thoughts on the future of critical infrastructure security.<p>As threats and cyber-attacks on …

Cybersecurity

Ransomware attack blacks out screens at Bristol Airport

Airport officials decline to pay ransom demand and manually restore all affected systems. Functionality has been restored to all screens after two …

Cyber-attacks

​Linux adds a code of conduct for programmers

In the aftermath of Linus Torvalds apologizing for how he's been running the Linux kernel community, Linux has adopted a new code of conduct. But …

Codes of Conduct

Facebook bolsters security protections for candidates, elected officials

A new ​pilot program offers upgraded cybersecurity protections to accounts associated with candidates and elected officials.<p>Facebook is rolling out a …

Cambridge Analytica