So all the traffic for Japan "accidentally" went into google?
Posts by razorfishsl
972 publicly visible posts • joined 27 Feb 2014
Google routing blunder sent Japan's Internet dark on Friday
AccuWeather: Our app slurped your phone's location via Wi-Fi but we like totally didn't use it
NotPetya ransomware attack cost us $300m – shipping giant Maersk
Re: Easy to mitigate
It's like China ..
You MUST USE the local government supplied software, don't use it , you are out of business.
The fact that it is supplied from fixed ip addresses over Http connections & auto installs & updates , has nothing to do with it.
Boy..... is a reckoning coming to China , once the malware writers start doing research into local government offices and their pisspoor requirements of "nepotism software" they force on local businesses.
Creepy backdoor found in NetSarang server management software
Read IBM CEO Ginni Rometty's letter to staff: Why I walked from Trump's strategy forum
Notice she lists out who they have worked with to "improve" mankind's lot....
The full irony of this is that IBM were instrumental in record keeping for the Nazis and many of the Death camp inmates actually have the IBM card number still tattooed on their skin.
So a company with past Nazi links beats down a president about how bad nazis are.
Seems she failed to mention this little gem.
Rowhammer RAM attack adapted to hit flash storage
Place your bets: How long will 1TFLOPS HPE box last in space without proper rad hardening
Alibaba: We're no haven for pirates – we'll yank fake goods from our web bazaars within 24 hours
Infosec eggheads rig USB desk lamp to leak passwords via Bluetooth
Nothing new, just a simple USB shill with re-direct to blue tooth.
Had such hacks ar ound the 2008's , also had attack models for the new version of firewire and a range of malware firmwares for the oxford chipset with Java loaders. just sad firewire did not take off properly.
later a range of USB 3.1 with intelligent peripheral hacks waiting in the wings.
It is not what is published that is interesting.......this is mostly just "jump on the bandwagon" stuff from research not published.
Revealed: The naughty tricks used by web ads to bypass blockers
Linux kernel hardeners Grsecurity sue open source's Bruce Perens
Adobe will kill Flash by 2020: No more updates, support, tears, pain...
Linus Torvalds pens vintage 'f*cking' rant at kernel dev's 'utter BS'
He is 100% correct.
We currently have 3 servers running linux that just stop, usually about the end of the month and always on an "o'clock" , jobs have been moved about and yet no job appears to coincide with the times the servers stop.
Take an exact bit image and moe it to a PC and it works reliably, put it back on a server and the errors come out.
There is nothing in any log, the system just STOPS dead, only a power cycle can restart it.
If idiots are allowed to just handle errors anyway they want then way more situations like this will occur, you may as well just use windows.
Fine, he may not be the most diplomatic, charismatic person on the planet and sometimes he's a complete twat, but look how far linux has come and what the whole planet has gained from that.
Take linux out of the equation and look at the shit we would have been left with.
In any equation it is rarely one-sided perfection.
Flash... Nu-uh! Tech folk champing at the bit to switch off life support
So who exactly was to blame for Marketo losing its dotcom?
It is down to Dumb ass IT staff.
Several years ago, I joined a company , one of my first tasks was to assign a single email address for all critical domain/software/hardware registration.
Prior to that 4 other names of previous staff were in the system.
I'm now moving on.
Guess what...... some other guy has other ideas and is currently re-registering the services under his own company email address tied to his personal name.
So why bother being professional ........ when it can take a year to track down all the missing registrations, only to have someone else come and undo it all.
systemd
'oh! DNS lib underscore bug bites everyone's favorite init tool, blanks Netflix
China crams spyware on phones in Muslim-majority province
Volterman 'super wallet': The worst crowdsource video pitch of all time?
Sweden leaked every car owners' details last year, then tried to hush it up
HPE claims new gen-10 ProLiants have more mem persistence, more secure server firmware
.. ..-. / -.-- --- ..- / -.-. .- -. / .-. . .- -.. / - .... .. ... then a US Navy fondleslab just put you out of a job
Google ships WannaCrypt for Android, disguised as Samba app
UK Parliament hack: Really, a brute-force attack? Really?
Heaps of Windows 10 internal builds, private source code leak online
Ego stroking, effusive praise and promise of billions: White House tech meeting in full
Two leading ladies of Europe warn that internet regulation is coming
Microsoft officially hangs up on old Skype phones, users fuming
They don't want those phones running, it does not fit in with their business plans.
The same way they modified office to deliberately destroy office documents on osx in an attempt to force people to use onedrive,
and the same way they deliberately cripple osx skype for business to prevent contacting non-business users.
Going to Mars may give you cancer, warns doc
Boffins get routers spilling secrets through their LEDs
Utah fights man's attempt to marry laptop
China cyber-security law will keep citizens' data within the Great Firewall
The sad thing is that it is the government & supposed top level controllers that are the problem.
We had a Chins tech. into one of our offices in China, his machine was so infected with viruses that it was tripping our internal systems every 2 seconds.
We have even had China Telicom staff, who maintain the endpoints, with the same problems.
This is where the issues are and they are not being corrected.
New 'Beaver' web server has exactly ONE user outside China
Network-sniffing, automation, machine learning: How to get better threat intel
In this day and age "firewalls" are basically useless.
There is no boundary any longer , certainly in China where the majority of set top boxes and off brand mobile phones are loaded with backdoors built directly into the OS.
On top of that you have the multitude of Desktop & mobile software , specifically written to appeal to users requirements, character input methods, translation software, cloud based hand jobs.
looks like a translation app, acts like a translation app, unfortunately when your logged into you tax or banking app, there it is screen capping and sending highly confidential data back to the cloud and all without data encryption, but hay... it certainly translates shit.
Bitcoin exchange Coinbase crashes after Asian buying frenzy
Well this is awkward. As Microsoft was bragging about Office at Build, Office 365 went down
Gamers red hot with fury over Intel Core i7-7700 temperature spikes
Re: Within parameters
Does not work like that.......
For every 10 deg above 25 deg junction temp you loose 50% of the life at 25 deg, this is well known for all designers.
The cooler & closer you run to 25 or below the longer the life.
The 90 deg. matters WHERE it is measured., junction core case or air.
If you are measuring 90 at the case you have massive problems, due to thermal lag the die & junction will be WAY higher.
Male escort forgot pregnancy protection, scores data protection instead
Yeah, keep buying those SSDs, grins Seagate: Your data will be on our disks eventually, muaha
Super-secure Pi-stuffed nomx email server box given a good probing
'We should have done better' – the feeble words of a CEO caught using real hospital IT in infosec product demos
Mondays suck. So why not spend yours playing with an original Mac and games in your browser
Toshiba conglomerate: Can we keep going? We don't know
Prisoners built two PCs from parts, hid them in ceiling, connected to the state's network and did cybershenanigans
Re: They would have got away with it
**Example of a professional Microsoft rant....**
I have a very nice email from microsoft tech support explaining why they have DELIBERATELY changed the 2016 office software to loose attachments.
Double clicking on a word attachment in outlook opens the file in word, but puts the file in a temp directory .......8 levels down.
so when you do a save , guess where it goes?
and when you quit outlook...... guess what happens to the "temp" folder.
the explanation goes on to point out,.......
but notice how we have made the "one-drive service" very easy to use for saving your documents., the functionality is by design.. Please use one drive.