Cybersecurity

Google now blocking websites that show fake download buttons | Ars Technica UK

Google has now started blocking websites that use deceptive content or ads to make you do things that you wouldn’t normally do, such as fake download buttons that appear right next to the real download button, or pop-ups demanding you phone tech support to remove a million malware infections that were apparently found on your computer.

New European, U.S. data transfer pact agreed | Reuters

European and U.S. negotiators agreed a data pact on Tuesday that should prevent European Union regulators from restricting data transfers by companies such as Google and Amazon across the Atlantic. http://mobile.reuters.com/article/idUSKCN0VB1RN Posted from WordPress for Android

How Do I Drop or Block Attackers IP Address With Null Routes On a Linux?

Someone might attack your Linux based system. You can drop attacker IP using IPtables. However, you can use the route or ip command to null route unwanted traffic. A null route (also called as blackhole route) is a network route or kernel routing table entry that goes nowhere. http://www.cyberciti.biz/tips/how-do-i-drop-or-block-attackers-ip-with-null-routes.html Posted from WordPress for Android

Internet of Exploits (IoE)

I recommend that we start using new term I heard at Disobey.fi event: Internet of Exploits (IoE) is to be used to describe the current and future situation of network being filled exploitable Internet of Things (IoT) and other poorly secured networked devices. We were sold the idea of Internet of Everything (IoE) and what