You might be interested in …

[TheRecord] Crypto-mining botnet modifies CPU configurations to increase its mining power

A crypto-mining botnet is modifying CPU configurations on hacked Linux servers in order to increase the performance and output of its cryptocurrency mining code. The attacks, detected by cloud security firm Uptycs, represent the first instances where a threat actor modifies a processor’s MSR to disable a CPU feature called hardware prefetcher. Enabled by default […]

Read More

[ZDNet] Mozilla’s latest privacy ranking slaps ‘Privacy Not Included’ tag on Facebook Messenger, WeChat and Houseparty

All posts, ZDNet

Slack also faced criticism from Mozilla researchers for not allowing users to block contacts. Source: Read More (Latest topics for ZDNet in Security)

Read More

Daily NCSC-FI news followup 2019-06-11

Wi-Fi in the office convenient but risky www.kaspersky.com/blog/vulnerable-wi-fi/27250/ Almost every office has a Wi-Fi network today, and sometimes more than one. Who wants to connect laptops with a cable? And forget about smartphones and tablets! However, a wireless network can be a weak point in your IT infrastructure. Not all companies use complex and unique […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.