A cybersecurity professional today demonstrated a long-known unpatched weakness in Microsoft’s Azure cloud service by exploiting it to take control over Windows Live Tiles, one of the key features Microsoft built into Windows 8 operating system. —Mohit Kumar
A team of security researchers on Wednesday issued a stern warning about a DNS Hijacking campaign being carried out by an advanced, state-sponsored actor believed to be targetting sensitive networks and systems. —CircleID
Security researchers say they have found a new victim of the hacking group behind the potentially destructive malware, which targets critical infrastructure, known as Triton or Trisis. —Lorenzo Franceschi-Bicchierai
By pushing client-side DNS queries into HTTPS the Internet itself has effectively lost control of the client end of DNS, and each and every application, including the vast array of malware, can use DOH and the DNS as a command and control channel in a way that is undetectable by the client or client’s network operator. —Geoff Huston
The expectations are often high, not only for the MDM solutions ability to massively reduce the administrative workload of keeping track, updating and managing the often hundreds or thousands of devices within a company but also regarding the improvements towards the level of security that an MDM solution is regularly advertised to provide. —Florian Kiersch
But this is only the most obvious manifestation of Chinese maritime strategy. Another key element, one that’s far harder to discern, is Beijing’s increasing influence in constructing and repairing the undersea cables that move virtually all the information on the internet. To understand the totality of China’s “Great Game” at sea, you have to look down to the ocean floor. —James Stavridis
As governments across the world have awoken to the immensely disruptive power of the internet, they have moved swiftly to contain and shape its forces in ways that mirror their national interests. —Kalev Leetaru
He turned up some significant results that contributed to the ethos of the time: your personality is baked into who you are and is probably secretly determining many of your choices in life. Your job is to discover your personality and then find the right role for yourself in life so that you can find happiness without doing violence to your true self. (Remember how they wrote “never change” in your yearbook?) —Jeffrey A. Tucker
There are many ways to think about where your data is stored. The most popular today are centralized vs decentralized, and the other is where the borders are. Today, I’ll only discuss the latter. —Kris Constable
But by the end, I realized I disagree deeply with Medium about the ethics of design. And by ethics, I mean something simple: though Medium and I are both making tools for writers, what I want for writers and what Medium wants couldn’t be more different. Medium may be avoiding what made the typewriter bad, but it’s also avoiding what made it good. Writers who are tempted to use Medium—or similar publishing tools—should be conscious of these tradeoffs. —Matthew Butterick
Related