Profile cover photo
Profile photo
Solarus Technologies
6 followers
6 followers
About
Posts

Post has attachment
“The move is significant given that email scamming has gone mostly unchecked for years, but Operation Wire Wire still represents a small drop in a massive ocean of fraud.”
Add a comment...

Post has attachment
“Apple has touted its dedication to user privacy for a long time, but it has been doing so even more as controversies surround companies like Facebook and Google.”
Add a comment...

Post has attachment
“Even if you're located outside of Ukraine, it does not mean you're safe. VPNFilter's behavior is unpredictable and anyone with an affected device should take measures to protect themselves. ”
Add a comment...

Post has attachment
“The Pentagon has often found it easier to occasionally give Microsoft multimillion-dollar contract for supporting specialized systems running on Windows XP, Windows 2003, and other legacy Microsoft products.”
Add a comment...

Post has attachment
“The payload itself is non-persistent and will not survive if the router is restarted,” Thakur added. “That payload will vanish.”
Add a comment...

Post has attachment
“More than a few owners of affected systems have paid Microsoft for repairs: screen replacement can be done for $450. The company says that anyone who had their screen replaced to address flickering should contact the company and apply for a refund.”
Add a comment...

Post has attachment
“Unfixed bugs in widely used email programs make it possible for attackers to obtain the plaintext of messages that are encrypted using the PGP and S/MIME standards”
Add a comment...

Post has attachment
“They admit that implementing their fix could take time and money. But without it, their proof-of-concept is intended to show how deeply and undetectably a computer’s security could be corrupted before it’s ever sold. ”
Add a comment...

Post has attachment
“"Neither AWS nor Amazon Route 53 were hacked or compromised. An upstream Internet Service Provider (ISP) was compromised by a malicious actor who then used that provider to announce a subset of Route 53 IP addresses to other networks with whom this ISP was peered.”
Add a comment...

Post has attachment
“Researchers have defeated a key protection against cryptocurrency theft with a series of attacks that transmit private keys out of digital wallets that are physically separated from the Internet and other networks.”
Add a comment...
Wait while more posts are being loaded