A few years ago, I worked at a web design agency as a product manager. The part of the job I loved the most was working on product with our design team and clients. Unfortunately, this was only about 10 percent of the work that I actually got to do. The majority of the time, I was trying to control the constant flow of stuff–keeping track of meeting notes, searching for files, and trying to stay up-to-date with the latest technology news.
Source: How Clutter Affects Your Brain (and What You Can Do About It)
It seems as if every time I need to reload a physical system, I’m searching the Internet to find a way to create a bootable USB drive from a Windows 10 or Windows Server 2016 ISO. I always se…
Source: Use PowerShell to create a bootable USB drive from a Windows 10 or Windows Server 2016 ISO
It is a truth universally acknowledged in the infosecurity community, that giving away free USB sticks only leads to trouble. On countless occasions we’ve seen… #malware #taiwan #usbsticks
Source: Cybersecurity quiz winners rewarded with malware-infected USB sticks
At Ignite this week, I had a chance to sit down with Jeff Melnick to talk about the threats impacting Active Directory.
Source: Petri Dish: Chatting with Jeff Melnick About the Threats to Active Directory – Petri
The U.S. government has issued a rare technical alert, warning that attackers are continuing to compromise organizations across the energy sector, often by first
Source: Alert: Energy Sector Hacking Campaign Continues
During the Virus Bulletin closing keynote, Brian Honan urged the security industry to share more, victim-shame less and work harder to establish trust.
Source: Security Industry Failing to Establish Trust
A malware campaign utilizing bogus “HoeflerText” popup warnings is back in full swing targeting Google Chrome and Firefox browsers with Locky ransomware attacks and the NetSupport Manager RAT.
Source: ‘HoeflerText’ Popups Target Browsers With RAT and Locky Ransomware
GitLab fixed a vulnerability recently that could have opened its users up to session hijacking attacks.
Source: Session Hijacking Bug Exposed GitLab Users Private Tokens
Cyberwar has evolved from the theoretical to the ominous. TechRepublic went inside one of the defenders vs. hackers war games that’s helping countries prepare to defend themselves.
Source: Defending against cyberwar: How the cybersecurity elite are working to prevent a digital apocalypse – TechRepublic