A volcano has erupted on a small Italian island, sending tourists fleeing from their hotels. Fires were seen on Stromboli but no injuries have been reported. “We saw the explosion from the hotel. There was a loud roar,” Michela Favorito, who works in a hotel on the island, told Reuters news agency. “We plugged our […]
Bitcoin uses as much energy as the whole of Switzerland, a new online tool from the University of Cambridge shows. The tool makes it easier to see how the crypto-currency network’s energy usage compares with other entities. However, one expert argued that it was the crypto-currency’s carbon footprint that really mattered. Currently, the tool estimates that […]
Some Facebook, Instagram and WhatsApp users cannot upload photos, videos and files. A spokesman for Facebook, which owns all three apps, told BBC News: “We’re working to get things back to normal as quickly as possible.” Together, the social networks have billions of users worldwide. In March, Facebook and Instagram suffered their longest period of disruption […]
Security researchers spot Silex malware targeting thousands of IoT devices A new strain of malware called Silex bricked over 2,000 IoT devices in just three-four hours of its operation on Tuesday, according to a report from ZDNet. The attacks are only expected to increase in the coming days as they are still ongoing. The malware is said […]
“Wormable” BlueKeep: Almost one million Windows machines are vulnerable to the flaw Security researchers have discovered nearly one million Windows PCs are still vulnerable to a “wormable” BlueKeep security flaw that could lead to a similar outbreak like WannaCry ransomware. For those unaware, BlueKeep is a term for a security vulnerability (CVE-2019-0708) (noted as “critical” […]
Information systems and software applications create logs that document events by time stamping activities like log generation, assessment, transmission, storage, archive and removal of communicated data. Because of the massive amount of logs created daily, it is vital to manage logs files for proficiency, security and regulatory and compliance. Using a log management software system allows techs […]
Russian military plans to replace Microsoft Windows with Astra Linux Russian army could very soon be replacing the Windows operating system on its military systems with Astra Linux. For those unaware, Astra Linux is a Debian-based Linux operating system developed to meet the needs of the Russian army, other armed forces and intelligence agencies. It provides data protection […]
Russia requires dating app Tinder to give user data to secret services on demand Tinder, the popular dating app, is now required to share information of its users – including messages and photos – with Russian authorities, the country’s communications regulator said on Monday. Under recent Russian laws, 175 companies have been put on a […]
CVE-2019-12735: Opening a specially crafted file in Vim or Neovim Editor could hack your Linux system Security expert Armin Razmjou recently detected a high-risk arbitrary OS command execution vulnerability (CVE-2019-12735) in Vim and Neovim. For those unaware, Vim and Neovim are two most popular and powerful command-line text editing applications that come pre-installed in most of the […]
Triada backdoors were preinstalled on few Android devices, Google reveals Google recently confirmed that some Android handsets were unknowingly infected with malware by smartphone manufactures even before they were shipped to customers. In a detailed study post, Google has explained how some hackers cleverly managed to put Triada, a malware designed to install spam apps on a device that […]