What is WannaCry ransomware?
Is your computer vulnerable to attack from WannaCry ransomware? Read on as we explore all there is to know about the WannaCry ransomware attack. In this article, you will learn:…
Disclosure of a Major Bug in CryptoNote Based Currencies
Overview In Monero, it has been discovered and patched a critical bug that affects all CryptoNote-based cryptocurrencies and allows for the creation of an unlimited number of coins in a…
Chinese internet giant Tencent buys 5% of Tesla
Tencent, Asia’s second highest valued tech firm, has bought a five percent share in Tesla. According to a filing, the Chinese firm scooped up 8,167,544 shares for around $1.7 billion…
How to Fix “No route to host” SSH Error in Linux
SSH is the most secure means of connecting to Linux servers remotely. And one of the common errors encountered while using SSH is the “ssh: connect to host port 22:…
Anti-Petya live CD (the fastest Stage1 key decoder)
❗❗❗ATTENTION❗❗❗ Please use the LATEST version of the decoder, available here: UPDATE: 17-th July, a new version of Petya has been released. At the moment, there is no way to…
Recovery from Petya ransomware
Victims of the Petya ransomware will be pleased to learn that there is a method to recover their files without having to connect the drive to a different computer. (I…
Petya – Taking Ransomware To The Low Level
Petya is different from other popular ransomware these days. Instead of encrypting files one by one, it denies access to the full system by attacking low-level structures on the disk.…
Diffie & Hellman Receive the 2015 Turing Award
Last week, the Association for Computing Machinery named Whitfield Diffie and Martin E. Hellman recipients of the 2015 Turing Award. They have been honored with this prestigious award for their…
Industroyer
The 2016 attack on Ukraine’s power grid that deprived part of its capital, Kyiv, of power for an hour was caused by a cyberattack. ESET researchers have since analyzed samples…
How to manually set up a Static or DHCP NIC in Ubuntu 20.04
How does it work? Netplan reads network configurations from /etc/netplan/*.yaml, written by administrators, installers, cloud image instantiations, or other OS deployments. During early boot, Netplan generates backend-specific configuration files in…