Security

2018 Winter Olympics a Prime Target for Hackers – IEEE – The Institute

http://theinstitute.ieee.org/ieee-roundup/blogs/blog/2018-winter-olympics-a-prime-target-for-hackers Malware has already made its way into the 2018 Winter Olympics, but hopefully the organization is capable of keeping everything working well without serious problems. This article claims that hackers are deploying malware capable of disrupting this year’s Winter Olympic Games, in Pyeongchang, South Korea. The malware is claimed to have the potential to

OpenSSH Server Best Security Practices

https://www.cyberciti.biz/tips/linux-unix-bsd-openssh-server-best-practices.html This page shows how to secure your OpenSSH server running on a Linux or Unix-like system to improve sshd security. Read also how to only allow ssh login using SSH keys https://www.cyberciti.biz/faq/how-to-disable-ssh-password-login-on-linux/

5 blockchain trends to watch for in 2018 | The Enterprisers Project

https://enterprisersproject.com/article/2017/12/5-blockchain-trends-watch-2018?sc_cid=7016000000127ECAAY Few new technologies have raised as much discussion as blockchain. One reason is the controversy, concern, and perceived opportunity around blockchain-based cryptocurrencies (such as bitcoin and ether) and crowdfunding via initial coin offerings (ICOs). But what is blockchain’s role in the enterprise?  This article gives some ideas to think about. Take those trends with grain of

Everything you want to know about x86 microcode, but might have been afraid to ask

https://media.ccc.de/v/34c3-9058-everything_you_want_to_know_about_x86_microcode_but_might_have_been_afraid_to_ask#t=2250 This is a quite interesting presentation on Intel CPU secrets:  Microcode is an abstraction layer on top of the physical components of a CPU and present in most general-purpose CPUs today. While it is well-known that CPUs feature a microcode update mechanism, very little is known about its inner workings given that microcode and

Escape Docker Container Using waitid() | CVE-2017-5123 | Twistlock

https://www.twistlock.com/2017/12/27/escaping-docker-container-using-waitid-cve-2017-5123/ In 2017 alone, 434 linux kernel exploits where found, and as you have seen in this post, kernel exploits can be devastating for containerized environments. This is because containers share the same kernel as the host, thus trusting the built-in protection mechanisms alone isn’t sufficient. Make sure your kernel is always updated on all

‘Kernel memory leaking’ Intel processor design flaw

https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/ A fundamental design flaw in Intel’s processor chips related to virtual memory system (Intel x86-64 hardware) allows normal user programs (even JavaScript in web browsers) to discern to some extent the layout or contents of protected kernel memory areas. It is understood the bug is present in modern Intel processors produced in the past decade. It appears a