Gus Strand

219 Flips | 4 Magazines | 1 Follower | @GusStrand | Keep up with Gus Strand on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Gus Strand”

Here's One Strategy for Thwarting Denial of Service Cyberattacks

Companies can reduce the risk from the type of cyberattack that took out major websites on Friday by using multiple vendors for the critical Internet …

Chinese firm admits its hacked products were behind Friday's massive DDOS attack

A Chinese electronics component manufacturer says its products inadvertently played a role in a massive cyberattack that disrupted major internet …

14 People Who Hold the Key to Internet Security

BENGALURU: Internet has become the best buddy of most of the people. Offering needed information instantly, it has made the world smarter by …

Anonymous' Most Notorious Hacker Is Back, and He's Gone Legit

Six months ago, Hector Monsegur hit send on an email to about a dozen new hires on the IT staff of a certain Seattle-based tech company whose names …

Security

15 Percent of All Routers Use Weak Passwords, 20 Percent Have Open Telnet Ports

<b>There's a reason why a large piece of the Internet went down last week after a DDoS attack on a key DNS service provider, and that is poor equipment</b> …

After Years Of Warnings, Internet Of Things Devices To Blame For Big Internet Attack

Hundreds of thousands of cameras, routers, and DVRs have been hijacked by malware for use in massive denial of service attacks.<p>On Friday, a series of massive distributed denial of service attacks disrupted access to major internet services including GitHub, Twitter, Spotify, and Netflix.<p>The …

Why Today’s Attacks on the Internet Are Just the Start

Thanks to powerful new botnets, hackers now have the ability to knock major companies—even whole countries—offline.<p>Back in September Bruce Schneier, …

Twitter and Much of The Internet Suffered a Meltdown on Friday

That awful feeling when you can’t get your Twitter fix was back early Friday morning eastern time for many users.<p>Twitter users reported getting a DNS …

Want to Know Julian Assange's Endgame? He Told You a Decade Ago

Amid a seemingly incessant deluge of leaks and hacks, Washington, DC staffers have learned to imagine how even the most benign email would look a …

Julian Assange

Public Wi-Fi: Users' habits and perceptions of risk

A new Xirrus survey highlights users’ habits and perceptions of risk when connecting to public Wi-Fi. The survey polled more than 2,000 business …

Wi-Fi

UK’s Financial Hub London Under Massive Ransomware Attacks

By Uzair AmirLondon’s official tourism slogan is “See the world. Visit London”This is a post from HackRead.com Read the original post: UK’s Financial …

Hackers hide stolen payment card data inside website product images

Attacks that compromise online shops to skim payment card details are increasing and growing in sophistication. The latest technique involves hiding …

Obama's concerned an AI could hack America's nukes | WIRED

Author: Andy Greenberg. Andy Greenberg Security<p>Date of Publication: 10.12.16.<p>Time of Publication: 6:55 am. 6:55 am<p>Obama’s Concerned an AI Could Hack …

Artificial Intelligence

Four Applications You Should Blacklist Today

This year has been a busy one for cyber-criminals. Reports indicate there have been over 500 data breaches and more than 500 million records exposed …

Cybersecurity Expert Mark Raymond Debunks Myths, Explores Future Of Internet Security

Just 10 years ago, only 30 percent of American adults reported owning a laptop computer -- a number that has now doubled, according to the Pew …

U.S. government officially accuses Russia of hacking campaign to interfere with elections

The Obama administration on Friday officially accused Russia of attempting to interfere in the 2016 elections, including by hacking the computers of the Democratic National Committee and other political organizations.<p>The denunciation, made by the Office of the Director of National Intelligence and …

IoT Botnets Are The New Normal of DDoS Attacks

If you’ve been on the wrong end of what passes for a modern-day DDoS attack, you’re well familiar with the firepower of the almighty DVR. That’s …

US official: Hackers targeted election systems of 20 states

Hackers have targeted the voter registration systems of more than 20 states in recent months, a Homeland Security Department official said Friday.<p>The …

How Did the Feds Get Past Yahoo’s Encryption? Yahoo!

Ever since Edward Snowden leaked his unprecedented collection of NSA secrets three years ago, tech firms have scrambled to protect their users from …

Privacy

Hacked voter registration systems: a recipe for election chaos

How do you disrupt the U.S. election? Hacking a voter registration database could very well do just that.Imagine thousands or even millions of …

Investigation Into the Downing of Malaysian MH17 and Potential Cyber Connections

Newly published findings by the Joint Investigative Team (JIT: includes members from Australia, Belgium, Malaysia, the Netherlands and Ukraine) shows …

Commanders: US Army Must Begin Preparing Soldiers for Battlefield Cyber Attack

The general spoke with government and industry officials during a forum on modernization at the Association of the United States Army's annual …

WikiLeaks plans to dump more sensitive files on US election

WikiLeaks is promising to release secret documents relating to the U.S. election, at a time when there are already questions over whether Russian …

How do you work out a country’s level of cybersecurity?

The Global Cybersecurity Index (GCI) measures a nation's commitment to cybersecurity and encourages countries to take the issue more seriously.The …

Who Makes the IoT Things Under Attack?

As KrebsOnSecurity observed over the weekend, the source code that powers the “Internet of Things” (IoT) botnet responsible for launching the …

Cybercrime and cyberwar: A spotter's guide to the groups that are out to get you

Security threats can come from a variety of different individuals and groups. Here's a field guide to the major players.<p>Cybercriminals are as varied …