Tech Firms Team Up to Take Down 'WireX' Android DDoS Botnet
- Krebs on Security
https://krebsonsecurity.com/2017/08/tech-firms-team-up-to-take-down-wirex-android-ddos-botnet
なんかこれ、いい
Cryptocurrency Mining #Malware #CoinMiner Spreads Using #NSA #Exploit
- The Merkle
https://themerkle.com/cryptocurrency-mining-malware-coinminer-uses-nsa-exploit-to-spread/
faker.js – Tool To Generate Fake Data For Testing
faker.js is a tool to generate fake data in Node.js and in the browser, it has a lot of different data types to enable you to generate very customised and complete sets of fake or mock data for testing purposes. It also supports multiple languages and locales and can generate a lot of data types […]The post faker.js – Tool To...
https://www.darknet.org.uk/2017/08/faker-js-tool-generate-fake-data-testing/
China’s top social networks face investigation for hosting porn and illicit content
https://techcrunch.com/2017/08/11/tencent-baidu-weibo-investigation-china
Hacking cars: cybersecurity regulations needed for new vehicles
Radware and Nokia Partner to Provide Best-in-Class DDOS Attack Detection and Mitigation
Army Cyber Command Building On Capabilities To Fight Thousands Of Threats Per Day
- Defense Daily Network (subscription)
http://news.google.com/news/url?sa=t&fd=R&ct2=us&usg=AFQjCNGkvMpdOy2nc0worPvd1WTp2DXu2g&clid=c3a7d30bb8a4878e06b80cf16b898331&ei=owBoWcC7AY3C3gH1nIioAg&url=http://www.defensedaily.com/army-cyber-command-building-capabilities-fight-thousands-threats-per-day/
Reckitt Benckiser quantifies cyber attack
Malware #Meltdown: Nuclear Power Plants Now Top Targets for Cybercrime
- Security Intelligence (blog)
http://news.google.com/news/url?sa=t&fd=R&ct2=us&usg=AFQjCNEFwqrfQX80uqq0RhGCQPmwlRy6Zw&clid=c3a7d30bb8a4878e06b80cf16b898331&ei=uApkWZiwF9rX3AHpkYHQDw&url=https://securityintelligence.com/news/malware-meltdown-nuclear-power-plants-now-top-targets-for-cybercrime/
CopyCat malware infected 14 million outdated Android devices
Pilgrim seeks to skip cybersecurity rules
- Cape Cod Times (subscription)
http://news.google.com/news/url?sa=t&fd=R&ct2=us&usg=AFQjCNG8LKxYfEl7S6BPlanBQTAE9_LUaQ&clid=c3a7d30bb8a4878e06b80cf16b898331&cid=52779550316239&ei=YNJiWcjDNYWQqQKJm7iQBg&url=http://www.capecodtimes.com/news/20170709/pilgrim-seeks-to-skip-cybersecurity-rules
Don't Ignore Ukraine: Lessons From the Borderland of the Internet
India to turn 5,000 of its scholars into cyber warriors | Daily Mail Online
Invasion and Immigration are two sides of the same coin.
Follow us ==> /ActivistPost.com
The President using a phone that hasn't had security updates in years? What could possibly go wrong?
In 2017, a GS3 certainly fits the description of an "old, unsecure Android phone."
https://www.androidcentral.com/which-android-phone-does-donald-trump-use
Next #WannaCry cyber attack could cost insurers $2.5 billion
Financial Services Quarterly Report - Second Quarter 2017: China Cybersecurity Law: Key Takeaways for Financial ...
- JD Supra (press release)
http://news.google.com/news/url?sa=t&fd=R&ct2=us&usg=AFQjCNGHhJWrvoj_Cabk2sUvNo1mDP15fg&clid=c3a7d30bb8a4878e06b80cf16b898331&ei=hiFcWYCvGszH3QGuhoPoBg&url=http://www.jdsupra.com/legalnews/financial-services-quarterly-report-91259/
Police Seize Servers of Ukrainian Software Firm After Cyber Attack