Jukka Matila

67 Flips | 6 Magazines | 48 Likes | 3 Following | @JukkaMatila | Keep up with Jukka Matila on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Jukka Matila”

UK Police Can Download The Contents Of Our Phones Without A Warrant - What Can Be Done?

As technologies used by the police race ahead of outdated legislation, we are left vulnerable to potential for misuse and abuse of our data<p>JACK GUEZ …

New security service from Cloudflare hopes to kill the VPN once and for all

Remote workers or business travelers have long been familiar with the travails of working through virtual-private network software, but Cloudflare …

Information Security

How a Tiny Dot Lets Criminals Impersonate Most Banks Online | Inc.com

A small, rarely used special character is potentially helping criminals trick people into falling prey to all sorts of online scams, and businesses -- including some of the world's leading media companies and financial institutions -- appear to be woefully unprepared.<p>Here is what you need to know …

Fake News

Why isn’t a VPN hiding my real location?

Using a VPN brings all kinds of benefits. One of the most important is that it gives you a new virtual location, maybe helping you access geoblocked …

Security in IoT space to be of prime focus in 2018: Experts

Kolkata, Dec 26 (PTI) Amid a rise in cyber attacks across the world, ensuring the security of devices linked to the Internet of Things (IoT) …

Edward Snowden’s app turns your spare phone into a security monitor

There’s finally a good use for your old Android phone—and it’s courtesy of Edward Snowden.<p>The famous whistleblower released an app on the Google App …

Get ready for a 2018 cryptocurrency crime wave

2018 could be the year of cryptocurrency hacks.<p>With bitcoin recently pushing past the $19,000 level (despite crashing hard on Friday) and a slew of …

FBI Software For Analyzing Fingerprints Contains Russian-Made Code, Whistleblowers Say

In a secret deal, a French company purchased code from a Kremlin-connected firm, incorporated it into its own software, and hid its existence from the FBI, according to documents and two whistleblowers. The allegations raise concerns that Russian hackers could compromise law enforcement computer …

Surveillance

Keylogger Found in HP Notebook Keyboard Driver

HP has released driver updates for hundreds of notebook models to remove debugging code that an attacker could have abused as a keylogger component. …

Debugging

How To: Discover Computers Vulnerable to EternalBlue & EternalRomance Zero-Days

The public leaks of NSA tools and information have led to the release of previously secret zero-day exploits such as EternalBlue, which was used in …

Complete Penetration Testing Tool List for Security Professionals

Penetration testing is the practice of launching authorized, simulated attacks against computer systems and their physical infrastructure to expose …

Number of HTTPS phishing sites triples

When, in January 2017, Mozilla and Google made Firefox and Chrome flag HTTP login pages as insecure, the intent was to make phishing pages easier to …

Phishing

Cyber Security: The World's Best And Worst Presented With A Well-Designed Infographic

Countries with the best (blue) and worst (red) malware infection rates.[/caption]<p>It’s no secret that online security is a global problem. Businesses and government agencies are hacked, corporations, hospitals and individuals are held up with ransomware, credit card numbers and passwords are …

Cybersecurity

How to Set Up HTTPS Locally Without Getting Annoying Browser Privacy Errors

Setting up HTTPS locally can be tricky business. Even if you do manage to wrestle self-signed certificates into submission, you still end up with …

Smart TV hack embeds attack code into broadcast signal—no access required

Demo exploit is inexpensive, remote, scalable—and opens door to more advanced hacks.<p>A new attack that uses terrestrial radio signals to hack a wide …

Information Security

Anonymous publishes what appear to be Sean Spicer's Twitter passwords [Updated]

Anonymous just shared two tweets from White House Press Secretary Sean Spicer that appear to belong to his Twitter account. The collective doesn’t appear to have been involved in the security breach, if there was one — but it did publish two screencaps snagged by someone in the seconds they were …

Donald Trump

How to add two-factor authentication to Linux with Google Authenticator

Locking access to your computer (and the data it holds) with just a password doesn’t cut the mustard any more in this age of multi-core processors …

NASA Produces First 3D Animation of Global Carbon Emissions

By Leo Hickman<p>The National Aeronautics and Space Administration (NASA), the U.S. space agency, has released an "eye-popping" three-dimensional …

These 5 mind-melting thought experiments helped Albert Einstein come up with his most revolutionary scientific ideas

One of Einstein's most defining qualities was his remarkable ability to conceptualize complex scientific ideas by imagining real-life scenarios. He called these scenarios Gedankenexperiments, which is German for thought experiments.<p>Here are a few thought experiments that demonstrate some of …

15 Useful ‘sed’ Command Tips and Tricks for Daily Linux System Administration Tasks

Every system administrator has to deal with plain text files on a daily basis. Knowing how to view certain sections, how to replace words, and how to …

Linux

Tyrion Lannister Caught Riding A Scooter Gets Hilariously Photoshopped (13+ Pics)

Peter Dinklage from Game of Thrones has just entered his toughest battle yet. But the battle isn't taking place in Westeros. It's taking place on the …

Watch Electromagnets Explosively Shred a Soda Can in Half

Everyone knows you can do some crazy stuff with magnets, but things get really insane when you start playing with <i>electro</i>magnets. When you run an …

Magnetism

NASA's Mars Recruitment Posters Will Convince You to Go Die in Space

Okay, poster. You make a compelling argument—sign us up!<p>True, there will be obstacles: For one, the Martian corps that these recruitment posters from …

Get swept away with NASA's 'Mars Explorers Wanted' posters

It looks like NASA wants to attract as many future settlers to Mars as possible.<p>The agency is doing a good job of that by releasing stunning …

Linux Systems Performance 2016

Talk for PerconaLive 2016 by Brendan Gregg. Video: https://www.youtube.com/watch?v=CbmEDXq7es0 . "Systems performance provides a different perspective for analysis and tuning, and can help you find performance wins for your databases, applications, and the kernel. However, most of us are not …

Linux

Make This: A Cheese Slicer You Can Be Proud Of

With spring in the air, it's time to start thinking of long nights on the patio with food friends, and a bit of vino. Nothing goes better with that …

Gouda

5 command line tools you should be using

I do firmly believe every developer who’s worth their salt should have at least some notion of how to work with the command line, if only because …

Command-line

Guinevere - Automated Security Assessment Reporting Tool

This tool works with Gauntlet (a private tool) to automate assessment reporting.<p>Main features include:<p>Generate Assessment Report<br>• Export …

File Permissions in Linux/Unix with Example

Linux is a clone of UNIX, the <b>multi-user operating system</b> which can be accessed by many users simultaneously. Linux can also be used in mainframes and …