Another day, another global malware attack made possible by a Microsoft security hole. Once again, attackers used hacking tools developed by the U.S. National Security Agency (NSA), which were stolen and subsequently released by a group called Shadow Brokers.This time around, though, the late-June attack apparently wasn’t ransomware with which the attackers hoped to make a killing. Instead, as The New York Times noted, it was likely an attack by Russia on Ukraine on the eve of a holiday celebrating the Ukrainian constitution, which was written after Ukraine broke away from Russia. According to the Times, the attack froze “computers in Ukrainian hospitals, supermarkets, and even the systems for radiation monitoring at the old Chernobyl nuclear plant.” After that, it spread worldwide. The rest of the world was nothing more than collateral damage.The NSA bears a lot of responsibility for this latest attack because it develops these kinds of hacking tools and frequently … [Read more...] about The ancient Microsoft networking protocol at the core of the latest global malware attack
FTP stands for ‘File Transfer Protocol‘ is one of the most widely used and standard protocol available over Internet. FTP works in a Server/Client architecture and is used to transfer file. Initially FTP client were command-line based. Now most of the platform comes bundled with FTP client and server program and a lot of FTP Client/Server Program is available. Here we are presenting 10 Interview Questions based on Vsftp (Very Secure File Transfer Protocol) on a Linux Server. 10 VsFTP Interview Questions 1. What is the Difference between TFTP and FTP Server? Answer : TFTP is File Transfer Protocol which usages User Datagram Protocol (UDP) whereas FTP usages Transmission Control Protocol (TCP). TCP usages port number 20 for Data and 21 for control by default whereas TFTP usages port 69 by default. Note: Briefly you can say FTP usages port 21 by default when clarification between Data and Control is not required. 2. How to Restrict Users and Disallow browsing … [Read more...] about 10 VsFTP (Very Secure File Transfer Protocol) Interview Questions and Answers
Finding evidence for life on Mars has been a decades-long ambition for NASA, which has spent billions of dollars to send machines wheeling over, poking and probing the Red Planet. But once the signs of life are found, how are those findings verified? In early January, NASA's Curiosity Mars rover came across what some researchers thought might be trace fossils on Mars. Researchers first spotted the eye-catching, tiny, stick-like features in black-and white imagery, but they were compelling and unusual enough for the rover science team to roll the robot back to further interrogate them. A strictly mineral origin was deemed to be the most plausible. Still, for some, the features suggested bioturbation — a process through which organisms living in sediments can disturb the very structure of those sediments. The oddities looked similar to Ordovician trace fossils here on Earth, which stem from an era more than 440 million years ago. [12 Possible Reasons We Haven't Found Aliens] … [Read more...] about Life Detection on Mars: Are Red Planet Protocols in Place?
We've been hearing all about the Apple iWatch, and the noise has definitely been kicked-up a notch ever since Samsung outed their conflicting Gear smartwatch. By now, it's pretty much certain that Apple will be joining in on the wearables fun, and it's fair to say that a smartwatch is right up Cupertino's alley, seeing as design is king when timepieces are involved. Design, precisely, is what Apple will undoubtedly shoot for, though this facet of the package has proven difficult to solve for the rest of the current pioneers, like Sony and Samsung. This has resulted in passable, but somewhat chubby looks. Apple may be looking to push the boundaries on that last front, thanks to a new patent it filed just today. The patent in question describes a new protocol for Bluetooth-equipped devices, that may bring significant increases in efficiency, by pairing said devices on demand only. Whether this will work seamlessly in the background, or you'll have to do this manually isn't known at this … [Read more...] about Apple’s latest patent filing suggest that it’s working on a new Bluetooth protocol for iWatch
Apple has demonstrated numerous times that security is a top priority in its software efforts. For example, improvements to iOS 9 have made it harder for attackers to employ the old trick of abusing stolen enterprise certificates to lure unsuspecting users into installing unauthorized apps. But it appears Apple left a hole open for knowledgeable attackers to exploit. At the Black Hat Asia security conference, Check Point researchers will show the 'Sidestepper' method of compromising the communication between mobile device management products and iOS devices to execute man-in-the-middle attacks, installing malware on non-jailbroken devices with minimal user input. Abusing stolen enterprise development certificates is a common way for hackers to infect non-jailbroken iOS devices. Normally, these code-signing certificates are obtained through the Apple Developer Enterprise Program and let companies distribute apps internally without submitting them inside the app store. In older iOS … [Read more...] about Vulnerability in iOS’ mobile device management protocol lets hackers push malware to enterprise iPhones