Cyber security technology solutions continue to advance, as do cyber-attack methods. Cisco is tracking this phenomenon in malware development by measuring Time To Evolve (TTE) — essentially the time that lapses between distinct changes in evasive file and delivery tactics. Malicious hackers’ inventiveness and sophistication has allowed six malware families to continue creating havoc over an extended period of time. These strategies only partially explain why we see the same vulnerabilities being exploited year after year. If we worry too much about sophisticated zero-day attacks or become distracted by the overblown promises of the latest software package, we continue to neglect the elements that are proven to protect or expose us.
Cyber-attackers tried to trigger a deadly explosion at a petrochemical plant in Saudi Arabia in August and failed only because of a code glitch, The New York Times reported.
Several things make bare-metal cloud providers appealing compared with traditional cloud providers, which operate in a virtualized environment. Bare-metal providers give users more control, more access to hardware, more performance, and the ability to pick their own operating environment.
Federal, state and local officials who oversee election infrastructure and security are optimistic about their ability to share information that’s needed to protect elections from malicious actors.
Zero-day exploits earned hackers $105,000 in total on Thursday during the second day of the Pwn2Own contest in Vancouver, British Columbia.
Security researchers who rely on data included in Web site domain name records to combat spammers and scammers will likely lose access to that information for at least six months starting at the end of May 2018, under a new proposal that seeks to bring the system in line with new European privacy laws. The result, some experts warn, will likely mean more spams and scams landing in your inbox.
Apple has a long legacy of providing services to schools and teachers, but the industry has shifted in recent years as the Chromebook has completely changed the way classrooms work. The company is no doubt looking to take back some of that mindshare. This morning, it sent out invites for an event, asking attendees to, “take a field trip.”
Have you heard it said that everything in Linux is a file? That is largely true, and that’s why the ability to manipulate files is crucial to mastering Linux Fu.
One thing that makes a Linux filesystem so versatile is the ability for a file to be many places at once. It boils down to keeping the file in one place but using it in another. This is handy to keep disk access snappy, to modify a running system, or merely to keep things organized in a way that suits your needs.
There are several key features that lend to this versatility: links, bind mounts, and user space file systems immediately come to mind. Let’s take a look at how these work and how you’ll often see them used.
There are two kinds of links: hard and soft (or symbolic). Hard links only work on a single file system (that is, a single disk drive) and essentially makes an alias for an existing file:
ln /home/hackaday/foo /tmp/bar
If you issue this command, the file in /home/hackaday/foo (the original file) and the file /tmp/bar will be identical. Not copies. If you change one, the other will change too. That makes sense because there is only one copy of the data. You simply have two identical directory entries. Note the order of the arguments is just like a copy command. the File foo is the original file and the new link you’re creating is called bar.
These are not super useful because they do require the files to be on the same file system. They can also be hard to maintain since it is not always obvious what’s going on internally. Using the -l option (that’s a lower case ‘L’) on an ls command shows the number of links to a particular file. Usually, this is one, although directories will have more because each .. reference from a subdirectory will count as a link as well as the actual entry (.) and the entry in the parent directory. If you want to find all the hard links that are the same, you’ll need to search the file system (use find and check out the -samefile option).
Symbolic links are much more useful since they can span file systems. Essentially, a symbolic link or symlink is just a file that contains the name of another file. The file system knows that when you work with that file, you really mean the referenced file. The command to create is the same, with a single option added:
ln -s /home/hackaday/foo /tmp/bar
Alexa is rolling out an optional “Brief Mode” that lets users configure their Echo devices to use chimes and sounds for confirmations, instead of having Alexa respond with her voice. For example, if you ask Alexa to turn on your lights today, she will respond “okay” as she does so. But with Brief Mode enabled, Alexa will instead emit a small chime as she performs the task.
[unable to retrieve full-text content]
John Minchillo/Associated Press
As we witnessed Thursday during the 2018 NCAA men’s basketball tournament, the most unlikely teams are able to pull off upsets.