Motherboard Investigation: How cybercriminals steal mobile numbers with the help of employees of telecom companies

Motherboard Investigation: How cybercriminals steal mobile numbers with the help of employees of telecom companies
 
 
Image:
Pixabay

 

 
Motherboard published material , dedicated to attacks on users of large mobile operators. According to journalists, more and more often cybercriminals bribe employees of telecom companies, so that they transfer customer numbers to new SIM-cards. study showed that at the moment in the US there is a wave of such attacks. As a result, mobile users lose access to their accounts in social networks, and sometimes large amounts of money disappear from ...
+ 0 -

Encryption of the default key in OpenSSH is worse than its absence

The authors of this material argue against the standard key encryption mechanisms in OpenSSH.
 
 
Encryption of the default key in OpenSSH is worse than its absence
 
Recently, attackers used the npm-package eslint-scope to steal npm-tokens from home user directories. In the light of this event, we checked out other similar vulnerabilities and thought about how to reduce the risks and consequences of such incidents.
 
 
Most of us have an RSA SSH key at hand. Such a key gives the owner various privileges: as a rule, it is used to access the production environment or in GitHub. Unlike nmp tokens, SSH keys are encrypted, and therefore it is accepted that nothing terrible ...
+ 0 -

Weekly contest from OpenGift for developers

Weekly contest from OpenGift for developers
 
 

Become members of the online hackatons from OpenGif!


 
The task of the nearest contest will be open on August 18 at 10:00 GMT, the prize fund of $ 1?000 in platform tokens!
 
registration of is required. .
 
 
You can follow announcements about new hakatons in group .   Become members of the online hackatons from OpenGif!  The task of the nearest contest will be open on August 18 at 10:00 GMT, the prize fund of $ 1?000 in platform tokens!  registration of is required. .  You can follow announcements about new hakatons in group ...[/h]
+ 0 -

How to accidentally write a Web-GUI for Haproxy

How to accidentally write a Web-GUI for HaproxyThe modern world of system administrators has hijacked us with beautiful web-faces, which is not even a hunt to put software where there is not this "hue" (I feel that stones will fly from the orthodox stitching), well, not always through the line to climb there, right? All would be nothing if the software has set, set up and forgotten, and what to do if it needs to constantly climb, edit, and of course there is no log of all actions, do not write every time cp cfg cfg_back, eventually get confused and zabesh on this case .
 
 
...
+ 0 -

Unvisited IT

Did you notice the unevenness of human attention to different achievements? Memes that Steve Jobs and Dennis Ritchie were gone almost simultaneously, but only the death of the first was seen by society, although the contribution of the second in IT is gigantic:
 
 
Unvisited IT
 
Reality is inexorable: no matter how talented the screenwriter of the film, the actors will always get more attention, because they can be seen. No matter how professional the server technology maker is, Mark Zuckerberg will attract more attention, because the average user interacts with his project directly. This is normal: we all do not ...
+ 0 -

Where's my money, dude? What is Steam silent about (Part 1)

This is the first of six articles in which I want to review the entire process of publishing games on a PC from start to finish. Leave behind the braces development - in addition to it you are waiting for many other adventures. Choosing a publisher or an independent publication, localization and adaptation of the game, marketing and PR, choosing prices and planning discounts, working with publishers, distributors and intermediaries.
 
Where's my money, dude? What is Steam silent about (Part 1)  
We will talk a lot about Steam, the largest open platform for games, then we'll look at 3rd-party distribution and alternative sales options. Before you find your own answers ...
+ 0 -

Low-level hacking of ATMs NCR

+ 0 -

From ??? TFlops HPL to ASC'18 Application Innovation

Hello, Habr! We continue the series of articles about the participation of the team from St. Petersburg State University (we call ourselves EnterTildeDot) on the world's largest student supercomputer competitions.
 
From ??? TFlops HPL to ASC'18 Application Innovation
 
In this article we will look at the way to ASC'18 on the example of one team member, paying special attention to the business card of the competitions and modern supercomputers in general - Linpack. Well, let's look at the secret of achieving a record and antirecord of the performance of the computing system.
articles , including ...
+ 0 -

How JS works: custom elements

+ 0 -

Test performance of several types of drives in a virtual environment

Test performance of several types of drives in a virtual environmentTechnologies of virtualization are in demand today not only in the segment of "big business", but also in SMB and home users. In particular, for small server companies, virtualization can be used to implement a number of not very resource-intensive services. In this case, it usually refers to stand-alone servers based on single- or dual-processor platforms, with a relatively small amount of RAM in 32-64 GB and without special high-performance storage. But for all the benefits, you need to be aware that in terms of performance, virtual systems are different from real ones. In this article, we compare ...
+ 0 -