Kervin Ramsajan

1,029 Added | 1 Magazine | 12 Likes | 5 Followers | @KervinRamsa2015 | Keep up with Kervin Ramsajan on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Kervin Ramsajan”

OpenSSH now available in PowerShell in Cloud Shell

PowerShell in Cloud Shell now includes the native Win32 OpenSSH client available for Windows and Windows Server.<p>OpenSSH is a collection of …

Linux

Your Sloppy Bitcoin Drug Deals Will Haunt You For Years

Perhaps you bought some illegal narcotics on the Silk Road half a decade ago, back when that digital black market for every contraband imaginable was …

Bitcoin

Intel: Don't install our Spectre fix, risk of unwanted reboots is too great

The advice to stop offering the firmware update comes after the chipmaker investigated reports the patch was causing unexpected reboots on systems …

Information Security

Intel warns everyone not to download its Spectre and Meltdown patch | Trusted Reviews

<b>Intel has requested users stop installing its own Spectre/Malware patch after confirming the fix was causing people’s computers to shut down.</b><p>The firm …

Information Security

How to delete all your voice data from Amazon Echo, Google Assistant, Cortana and Siri

Amazon Echo's Alexa, Google Assistant and Cortana are always listening to obey your commands. Utter the wake word – Alexa, Cortana or Hey Google, and …

Cortana

Data-stealing spyware 'traced to Lebanon'

<b>A security bug that has infected thousands of smartphones has been uncovered by campaign group the Electronic Frontier Foundation (EFF).</b><p>Working with mobile security firm Lookout, researchers discovered that malware in fake messaging designed to look like WhatsApp and Signal had stolen gigabytes of …

Electronic Frontier Foundation

How the Triton malware shut down critical infrastructure in the Middle East

The December attack leveraged a zero-day flaw, and user error, to infect industrial equipment.<p>Building a slide deck, pitch, or presentation? Here are …

Cybersecurity

Hackers are using recent Microsoft Office vulnerabilities to distribute malware

Malware can steal passwords, bitcoin wallets, software keys, carry out DDoS attacks and more - and a campaign distributing it is targeting …

Information Security

The most secure VPNs of 2018: top picks for the best encryption

VPN security and encryption is a rather tricky business when you start digging deeper into the various issues involved. As you’re probably aware, the …

Triton malware: Next-gen cyberweapon that can shut down power plants accidentally leaked online

Triton malware, considered to be an advanced variant of Stuxnet, was used to shut down a Middle East oil and gas facility.<p>A powerful malware, dubbed …

Schneider Electric

Windows Meltdown-Spectre: Watch out for fake patches that spread malware

Criminals have yet to exploit Meltdown and Spectre, but they're playing on users' uncertainties about the CPU flaws in their malware and phishing …

What is Mirai Okiru? New botnet found targeting billions of ARC-based IoT devices worldwide

A security researcher on Twitter said the new Mirai botnet variant will change the "landscape of Linux IoT infection".<p>Security researchers have found …

Cybersecurity

One Of The 'Most Powerful' Android Spyware Tools Ever Was Just Uncovered

Italy is home to a remarkably bustling smartphone spyware industry. Hacking Team, infamously hacked itself in 2015, somehow remains one of the bigger players. But there are others: IPS, Area IT and RCS to name a few. On Tuesday, researchers from Russian firm Kaspersky Lab detailed a fresh Android …

Kaspersky Lab

Lenovo Discovers and Removes Backdoor in Networking Switches

Lenovo engineers have discovered a backdoor in the firmware of RackSwitch and BladeCenter networking switches. The company released firmware updates …

Information Security

Intel's Management Engine, a secure-computer-within-your-computer, is really, really insecure

Back in 2016, we published a good technological explainer about Intel's Management Engine, an evolution of the decade-plus old idea of "Trusted …

Intel AMT Security Issue Lets Attackers Bypass BIOS and BitLocker Passwords

An F-Secure security researcher has found a way to use Intel's Active Management Technology (AMT) to bypass BIOS passwords, BitLocker credentials, …

This Year's First Mac Malware Appears

"2018 is barely two weeks old, and already it looks like we've got new piece of macOS malware! Hooray :)"<p>That's how Apple-focused security researcher …

New security flaw detected in Intel hardware

Finnish cybersecurity specialist F-Secure has reported another serious flaw in Intel hardware. It has nothing to do with the Spectre and Meltdown …

Your data in Western Digital cloud storage devices may still be vulnerable

The devices allow remote backdoor admin access among other security concerns<p>Western Digital’s cloud storage devices are still vulnerable to security flaws despite patches issued to fix the bugs, the company has said in a blog post. According to the firm, future updates are being planned to patch …

Motherboard Vendors Release BIOS Updates For Spectre

BIOS updates to address the Spectre vulnerability have begun rolling out from the major motherboard OEMs.<p>Patches and updates for Meltdown/Spectre …

Information Security

Here's what you need to know about the WhatsApp group chat security flaw

Relax, nobody is going to be hacking your WhatsApp messages, at least not this way.<p>A lot of talk went down yesterday about a new way to exploit …

Google publishes list showing which Chromebooks are vulnerable to Meltdown vulnerability

Good news: not many<p>If you’re a regular Chromebook user and worried about the Meltdown bug endangering your data, Google has published a table on the Chromium Wiki detailing which devices are vulnerable, which aren’t, and which have been patched. You can read it in full here.<p>If the table says “Yes” …

After More Than a Decade, Wi-Fi Security Finally Gets a Major Update

WPA3 promises better authentication, stronger encryption and protection for open networks.<p>Wi-Fi Protected Access II, commonly known as WPA2, has been the standard for securing wireless networks for over a decade, but cracks are starting to show. The industry is now getting ready for its successor …

Wi-Fi

Microsoft and Signal team up to bring end-to-end encryption to Skype

As an extra layer of security, Skype has released a preview of end-to-end encrypted “Private Conversations.” Currently available for Skype Insiders, …

Encryption

88% of employees have no clue about their organization's IT security policies

A lack of awareness about company security rules could open enterprises and SMBs up to cyberthreats like ransomware, according to Kaspersky …

Responding to the Rise of Fileless Attacks

Fileless attacks, easier to conduct and more effective than traditional malware-based threats, pose a growing challenge to enterprise …

3 security issues facing self-driving cars

With companies like Google, Tesla, and Uber all racing to put self-driving cars on the road, the security of automated vehicles is a hotly topic of …

WhatsApp Security Flaws Could Allow Snoops to Slide Into Group Chats

When WhatsApp added end-to-end encryption to every conversation for its billion users two years ago, the mobile messaging giant significantly raised …

Encryption

Report: All Intel Processors Made in the Last Decade Might Have a Massive Security Flaw

There’s small screwups and big screwups. Here is tremendously huge screwup: Virtually all Intel processors produced in the last decade have a major …

Edward Snowden claims that he has discovered who rules the United States of America and he assures us that it is not the Russians.

He himself believed in all the noble intents of the government. He was not to blame because everyone in America believed in the government at that …