9 Sources For Tracking New Vulnerabilities
http://www.darkreading.com/vulnerabilities—threats/9-sources-for-tracking-new-vulnerabilities/d/d-id/1327186 This article lists many useful sources for information on new security vulnerabilities. →
http://www.darkreading.com/vulnerabilities—threats/9-sources-for-tracking-new-vulnerabilities/d/d-id/1327186 This article lists many useful sources for information on new security vulnerabilities. →
http://m.9gag.com/gag/amrN5pX?ref=fbp →
https://blog.hackster.io/project-a-moving-image-onto-a-deforming-surface-5d7308a81624#.fudc9x3ej There is a cool demonstration video on this article. →
https://motherboard.vice.com/read/blame-the-internet-of-things-for-destroying-the-internet-today?utm_source=mbtwitter A massive botnet of hacked Internet of Things devices has been implicated in the cyberattack that caused a significant internet outage on Friday. The botnet, which is powered by the malware known as Mirai, is in part responsible for the attack that intermittently knocked some popular websites offline, according to Level 3 Communications, one →
http://www.thedailybeast.com/articles/2016/10/21/why-today-s-attacks-on-the-internet-are-just-the-start.html?via=twitter_page →
http://spectrum.ieee.org/geek-life/hands-on/replace-legos-190-intelligent-brick-with-mits-scratch-and-a-40-raspberry-pi?utm_source=SocialFlow&utm_medium=Facebook&utm_campaign=Social&utm_content=FaceBook →
http://gizmodo.com/todays-brutal-ddos-attack-is-the-beginning-of-a-bleak-f-1788071976?utm_campaign=socialflow_gizmodo_facebook&utm_source=gizmodo_facebook&utm_medium=socialflow I don’t like this development in Internet attacks… →
http://nordic.businessinsider.com/companies-making-driverless-cars-by-2020-2016-10/ In five years we have many self-driving cars if everything goes as planned. →
http://www.iflscience.com/plants-and-animals/winners-wildlife-photographer-year-awards-absolutely-spectacular/ Amazing pictures to enjoy this friday. →
http://dirtycow.ninja/ The vulnerability, a variety known as a race condition, was found in the way Linux memory handles a duplication technique called copy on write. Untrusted users can exploit it to gain highly privileged write-access rights to memory mappings that would normally be read-only. →