Source: FBI to gain expanded hacking powers as Senate effort to block fails | Reuters
Newly discovered router flaw being hammered by in-the-wild attacks | Ars Technica
Researchers detect barrage of exploits targeting potentially millions of devices.
Source: Newly discovered router flaw being hammered by in-the-wild attacks | Ars Technica
Legal raids in five countries seize botnet servers, sinkhole 800,000+ domains | Ars Technica
At one point, Avalanche network was responsible for two-thirds of all phishing attacks.
Source: Legal raids in five countries seize botnet servers, sinkhole 800,000+ domains | Ars Technica
Easy way to uninstall OneDrive if you aren’t using it : Windows10
How to Disable Cortana in Windows 10’s Anniversary Update
Microsoft doesn’t want you to disable Cortana. You used to be able to turn Cortana off in Windows 10, but Microsoft removed that easy toggle switch in the Anniversary Update. But you can still disable Cortana via a registry hack or group policy setting. This transforms the Cortana box into a “Search Windows” tool for local application and file searches.
Source: How to Disable Cortana in Windows 10’s Anniversary Update
NSA could put undetectable “trapdoors” in millions of crypto keys | Ars Technica
Technique allows attackers to passively decrypt Diffie-Hellman protected data.
Source: NSA could put undetectable “trapdoors” in millions of crypto keys | Ars Technica
“Most serious” Linux privilege-escalation bug ever is under active exploit (updated) | Ars Technica
Lurking in the kernel for nine years, flaw gives untrusted users unfettered root access.
Source: “Most serious” Linux privilege-escalation bug ever is under active exploit (updated) | Ars Technica
There’s a new way to take down drones, and it doesn’t involve shotguns | Ars Technica
Not a jammer, device lets hackers fly drones and lock out original pilot.
Source: There’s a new way to take down drones, and it doesn’t involve shotguns | Ars Technica
How to block the ultrasonic signals you didn’t know were tracking you | Ars Technica
Your phone can talk to advertisers beyond your back, beyond your audible spectrum.
Source: How to block the ultrasonic signals you didn’t know were tracking you | Ars Technica
How Can I Keep Passwords Invisible When Running a Command as an SSH Argument?
Keeping our passwords well secured is something that we all need to take seriously, but what do you do if a particular program or app displays your password in plain sight as you are typing it? Today’s SuperUser Q&A post has the solution to a frustrated reader’s password problem.
Source: How Can I Keep Passwords Invisible When Running a Command as an SSH Argument?







