If you’re serious about typing, gaming, or using your PC for long periods of time, a mechanical keyboard is a great way to treat yourself to a more comfortable experience, but also improve your speed and accuracy too. —Jon Martindale
PacNOG is sometimes viewed as a meeting for only ISPs and those who have very big networks to manage. I guess this perception had made me question the usefulness of going in the past (having worked on government networks). —Suetena Faatuuala Loia
The crooks behind an affiliate program that paid cybercriminals to install the destructive and wildly successful GandCrab ransomware strain announced on May 31, 2019 they were terminating the program after allegedly having earned more than $2 billion in extortion payouts from victims. —Krebs on Security
But small details aside, his point is right: It does not make economic or environmental sense to “boil the sky” with warm air or the rivers with warm water. Large data centers, even very efficient ones, can and do put out a lot of heat, which wastes money, burns up energy and pushes up carbon emissions. —Andy Lawrence
Eight of the world’s biggest technology service providers were hacked by Chinese cyber spies in an elaborate and years-long invasion, Reuters found. The invasion exploited weaknesses in those companies, their customers, and the Western system of technological defense. —Jack Stubbs, Joseph Menn, Christopher Bing
Offensive Security has released an official version of Kali Linux for Raspberry Pi 4—the most powerful version of the compact computer board yet that was released just two weeks ago with the full 4GB of RAM at low cost and easy accessibility. —Wang Wei
But new data gathered from real-world appsec penetration tests exposes just what types of configuration mistakes organizations are making that expose their data. —Kelly Jackson Higgins
Security researchers say they have uncovered a massive espionage campaign involving the theft of call records from hacked cell network providers to conduct targeted surveillance on individuals of interest. —Zack Whittaker
Security researchers at Microsoft have released details of a new widespread campaign distributing an infamous piece of fileless malware that was primarily being found targeting European and Brazilian users earlier this year. —Swati Khandelwal
Blockchain is a linked list (i.e., a chain) of blocks that provides immutable, append-only and shared-data storage. Among other things, blockchain enables decentralization and a distributed consensus protocol for the historical log of shared states for transactional data sharing. Blockchain also supports applications that require tamper-evidence and transparency. —Miyuru Dayarathna
There are a lot of discussions nationwide about the ethics involved with providing video cameras. Today’s blog discusses topics you should consider if you offer, or plan to offer video cameras. —Doug Dawson
Related