Bash bug. We’re not talking about what to do when we find a cockroach – we’re talking about CVE-2014-6271/CVE-2014-7169, a remote vulnerability in what is arguably the most popular Unix/Linux command interpreter, and all versions of it since 1994 through…oh…now. This potentially allows virtually any hacker to get any (full) access to almost any non-Windows […]
System Administration
I would like to think I didn’t have to tell folks this, but my instincts say otherwise, so here: If you get an email, or a Tweet, or a Skype message, or a Facebook post offering you a link to stolen celebrity nude photos, just move on. Don’t stop and think about it. Don’t hover […]
Computer security folks use a tool known as VirusTotal to check suspicious files against a whole slew of antivirus programs at once. It’s a great way to see which, if any, antivirus programs may detect an exploit. Turns out that the bad guys are using it, too, so that they can alter their malware code […]
Recent Comments