Some further considerations of DoH as a secure set of protocols. I have been using it with Android Pie for some time to good effect
If you know anyone exposing RDP directly to the Internet, you have my permission to hit them over the head until they stop such foolish behavior.
A botnet is brute-forcing over 1.5 million RDP servers all over the world | ZDNet
Furthermore, statistics show that despite BlueKeep, most RDP attacks today are brute-force attempts.
Sophos open-sources Sandboxie, an utility for sandboxing any application | ZDNet
Sandboxie is now a free download. Source code to be open-sourced at a later date.
Unix at 50: How the OS that powered smartphones started from failure
Today, Unix powers iOS and Android—its legend begins with a gator and a trio of researchers.
Check all of the third-party connections to your social media accounts to ensure you don't get punked.
Twitter C.E.O. Jack Dorsey’s Account Hacked
Mr. Dorsey’s account began posting racial epithets, profanities and bomb threats on Friday afternoon. A company spokesman confirmed it was hacked.
Wow. This certainly isn't the MS from years ago.
exFAT in the Linux kernel? Yes! - Open Source Blog
We’re pleased to announce that Microsoft is supporting the addition of Microsoft’s exFAT technology to the Linux kernel.
Cyberwar: The Complete Guide
The threat of cyberwar looms over the future: a new dimension of conflict capable of leapfrogging borders and teleporting the chaos of war to civilians thousands of miles beyond its front.
Alert for those still using Webmin
Backdoor Found in Webmin Utility
Last year, an attacker was able to compromise the build system used for Webmin development and inserted a backdoor into the code, which was only revealed this week.
They still f**king suck. That's just my opinion, of course.
Court Rules That “Patent Troll” is Opinion, Not Defamation
Free speech in the patent world saw a big win on Friday, when the New Hampshire Supreme Court held that calling someone a “patent troll” doesn’t constitute defamation. The court’s opinion [PDF] is good news for critics of abusive patent litigation, and anyone who values robust public debate around...
5 Mistakes to Avoid When Buying a MicroSD Card
Buying MicroSD cards may seem simple, but here are a few critical mistakes to avoid if you don't want to regret your purchase.
Start Your Own ISP
This site is dedicated to helping you start your own Internet Service Provider. Specifically this guide is about building a Wireless ISP (WISP).
Congrats to the FastMail folks for helping modernize and secure email comms for the 21st century.
We’re making email more modern with JMAP
The specifications for JMAP Email have been published by the Internet Engineering Task Force (IETF), marking a big victory for email tools now and in the future.
Long live SFTP & SCP
Google Has Started Removing FTP Support From Chrome
Google developers have wanted to remove FTP support from the Chrome browser for quite some time and have been slowly whittling away at its support. In a series of proposed code changes and an "Intent to Remove", the end is near for the FTP protocol in Chrome.
I Shared My Phone Number. I Learned I Shouldn’t Have.
Our personal tech columnist asked security researchers what they could find out about him from just his cellphone number. Quite a lot, it turns out.
Thank to @maxeddy for the tip
Meet NordLynx – the new solution for a fast and secure VPN connection
Being forever-curious and imaginative geeks, we at NordVPN are always open to innovation. Today we are excited to announce our latest project: the NordLynx technology built around the WireGuard® protocol.
Google Online Security Blog: Making authentication even easier with FIDO2-based local user verification for Google Accounts
#BREAKING: Armed man driving "Trump" truck arrested outside migrant shelter in El Paso after immigration group spotted him "brandishing a knife." Police recovered a fully-loaded gun in his truck emblazoned with Donald Trump and Ted Cruz support slogans.
Google Researcher: The iPhone Is Not Exactly a Paragon of Security
At Black Hat, a Google security researcher details numerous bugs in iMessage that could be exploited remotely without interaction from the victim.