Latest Article

Calling Hawkins Power will give you 'Stranger Things' clues – CNET October 23, 2017

Fans of the Netflix series can call the fictional company Hawkins Power and Light to discover more clues of what may happen in the second season. Source: CNet

Loading images...

MySQL zero-day exploit puts some servers at risk of hacking

A publicly disclosed vulnerability in the MySQL database could allow attackers to completely compromise some servers.

The vulnerability affects “all MySQL servers in default configuration in all version branches (5.7, 5.6, and 5.5) including the latest versions,” as well as the MySQL-derived databases MariaDB and Percona DB, according to Dawid Golunski, the researcher who found it.

The flaw, tracked as CVE-2016-6662, can be exploited to modify the MySQL configuration file (my.cnf) and cause an attacker-controlled library to be executed with root privileges if the MySQL process is started with the mysqld_safe wrapper script.

To read this article in full or to leave a comment, please click here

Source: Security

Cozy up to 60,000 stars with ESA's dazzling interactive Star Mapper – CNET

The night sky is your oyster with the European Space Agency’s Star Mapper, a deep dive into the stars and constellations surrounding us.
Source: CNet

Instagram allows users to block nasty comments – CNET

Instagram is introducing a new feature that will allow users to filter and block offensive words in comments of their posts.
Source: CNet

Volvo's autonomous Drive Me project kicks off in Sweden – Roadshow

Its self-driving XC90s are surprisingly devoid of massive additions to the bodywork that we’ve seen on other autonomous cars.
Source: CNet

Gawker Media's new owner tries to wipe the slate clean – CNET

Univision, the new owner of Gawker Media, has deleted several posts that are the subject of litigation as it tries to repair the online brand’s reputation.
Source: CNet

Watch a triple spiral of 15,000 dominoes fall down – CNET

After spending 25 hours spread over eight days, YouTuber Hevesh5 set up a colorful spiral using thousands of dominoes.
Source: CNet

Realistic octopus backpack carries your books – CNET

Why bother with a boring bag when this backpack looks like you’re being hugged by a friendly cephalopod? Check out artist Olga Kotova’s latest crafty creation – George the octopus.
Source: CNet

Crafty GovRAT malware is growing, targeting U.S. government employees

A tough-to-detect malware that attacks government and corporate computers has been upgraded, making it more aggressive in its mission to steal sensitive files, according to security firm InfoArmor.

Last November, InfoArmor published details on GovRAT, a sophisticated piece of malware that’s designed to bypass antivirus tools. It does this by using stolen digital certificates to avoid detection.

Through GovRAT, hackers can potentially steal files from a victim’s computer, remotely execute commands, or upload other malware to the system.

To read this article in full or to leave a comment, please click here

Source: Security

At what age should a child use tablets, social media? (Open_Tab) – CNET

Kid-friendly apps can be found on screens of all sizes, but should kids start using this tech early in their lives?
Source: CNet

Keep the faith: A vote for voting systems

I’ve been having a little back-and-forth with InfoWorld’s Roger Grimes about security vulnerabilities in the U.S. election system. This was sparked by Roger’s post last week, “Voting machines are still too easy to hack.” The title says it all, but as Roger notes, the risk is mitigated by the fact that voting machines are not connected to the internet. You need physical access to voting machines in order to hack them.

This immediately led me to wonder about the vulnerability of systems that are connected to the internet, particularly in light of recent reports that Russian hackers had breached voter registration systems in Illinois and Arizona. What if hackers deleted registered voters wholesale? Some states allow you to register online or through motor-voter initiatives, so the state wouldn’t necessarily have a paper record, nor would many voters. If they weren’t on their designated polling station’s list, they could cast a provisional ballot, but that vote would be invalidated without the state having its own record of registration. Right?

To read this article in full or to leave a comment, please click here

Source: Security

Page 972 of 1236:« First « 969 970 971 972 973 974 975 » Last »