HakTip 151 – Linux Terminal 201: Apt vs Apt-Get

Today we’re talking about the differences between apt-get and apt in the Linux command line!
——————————-
Shop: http://www.hakshop.com
Support: http://www.patreon.com/threatwire
Subscribe: http://www.youtube.com/hak5
Our Site: http://www.hak5.org
Contact Us: http://www.twitter.com/hak5
Threat Wire RSS: https://shannonmorse.podbean.com/feed/
Threat Wire iTunes: https://itunes.apple.com/us/podcast/threat-wire/id1197048999

——————————

https://debian-handbook.info/browse/stable/sect.apt-get.html

Source: Security news


Source: Zologic

ENISA wins award for Excellence in innovation at EU Ombudsman Award for Good Administration

The EU’s Agency for cybersecurity, ENISA, received the EU Ombudsman Award for Good Administration for Excellence in Innovation for its project on Redefining European cyber cooperation, a cyber-crisis simulation executed in real-time (over 48 hours).
Source: Cybersecurity and digital privacy newsletter

Source: Privacy Online


Source: Zologic

Pioneers Winners: Make Us Laugh Challenge

After months of planning and making, we’ve come to the end of the first cycle of our new digital making programme for teenagers: it’s time to announce the Pioneers winners!

We laid down the epic challenge of making us laugh. And boy, did the teams deliver. I can honestly say that my face hurt from all the laughing on judging day.

The judges

The aim was to find a group of judges with a varied mix of interests and skills. We were beyond chuffed to snag this awesome group:

Dr Lucy Rogers

Dr Lucy Rogers having fun judging Pioneers Winners
Dr Lucy Rogers transforms simple tech into cool gadgets, science into plain English, and problems into opportunities. She’s a fellow of the Institution of Mechanical Engineers and author of the books ‘It’s ONLY Rocket Science‘ and the soon-to-be-published ‘Wiring the IoT‘. She’s also a Raspberry Jam organiser, a judge on BBC’s Robot Wars, and the person responsible for introducing Raspberry Pi-controlled animatronic dinosaurs to the Blackgang Chine Land of Imagination on the Isle of Wight.

Owen Daughtery

Owen Daughtery gif
Owen Daughtery is a graduate of Raspberry Pi’s Creative Technologists programme and an enthusiastic maker. You’ll no doubt recognise him from our original Pioneers videos and his inability to say a certain phrase. When he’s not making videos for us, or for his YouTube channel, Owen is also a skilled magician.

Bec Hill

Bec Hill gif
Comedian Bec Hill has a talent for incorporating arts and crafts into her stand-up routines, creating a unique and unforgettable comedy style that she calls ‘paper-puppetry’. She’s also creator of Pun Run, one half of entertainment duo Bec & Tom, and has voiced several characters for the newly released Mass Effect: Andromeda.

Maria Quevedo

Maria Quevedo gifMaria Quevedo is the director of Code Club UK. She’s amazing at yoga, cooks a mean Spanish tortilla, and originally hails from Argentina. She was also raised in a stationery shop, which is pretty much my dream. According to members of the Code Club team, Maria is delightfully calm under pressure…though she did fail to keep her cool when faced with judging the Pioneers winners.

The Pioneers winners

Winners of the first Pioneers challenge are…

After months of planning and making, the first round of Pioneers is over! We laid down the epic challenge of making us laugh. And boy, did the teams deliver. We can honestly say that my face hurt from all the laughing on judging day. Congratulations to everyone who took part.

Congratulations to the theme-winning team The Technological Tricksters and their project, Singing Potato. As Bec explained in the video, this project made us laugh…a lot. And through our tears of laughter, we were pleased to see the use of several different skills, along with a killer Gollum impression.

Alongside the overall theme winner, we also awarded prizes for the following five categories:

  • Inspiring Journey: the winners of this award experimented with a range of technologies, learned new skills and produced a final project that worked perfectly. Congratulations to Heritage Hackers and their Water Pistol Trap for winning this award.
  • Best Explanation: the team that hit the perfect balance of detail about what they made and how they made it were Black Thunder. We loved the explanation you gave for building your Living Joke Robot. Well done!
  • Technically Brilliant: the team that used the most impressive combination of technologies were the Shady Hackers with their Scare Chair Rig. Great use of a fire alarm hack…though we hope you didn’t use the home one.
  • We appreciate what you’re trying to do: making is a hobby which involves mistakes along the way, and it’s best to carry on without getting discouraged. Just because you haven’t finished, it doesn’t mean that you can’t submit your work to Pioneers and explain what you wanted to do and how. PiCymru‘s We Shall Overcomb did exactly that. We hope you manage to complete your project as we’d love to see it working!

Not forgetting…

Everyone was completely blown away by the projects we saw. And though we couldn’t award every entry a prize, the judges agreed that the following four projects deserved special recognition rewards for their teams:

Electrocuting computer mouse

Our mean boss wouldn’t let this one win (to be fair, we did say not to hurt anyone), but it genuinely made all the Raspberry Pi staff laugh which wins it a dishonourable mention from me. It was also a great hack of an electric fly trap. Well done Team Spark Wire…but maaaaybe try to be a little less lethal with your next submission.

And finally…

To everyone who took part in the first Pioneers challenge, thank you so much for your contributions, and congratulations on everything you achieved. You thrilled us with your tweets, emails, and final submissions, and we hope you also learned some great new skills and possibly made some new friends along the way. Massive thanks to our friends at the Shell Centenary Scholarship Fund for making Pioneers possible. Find out about their awesome work here.

The next Pioneers challenge is…

Shhh! It’s still a secret. We’re not announcing the new challenge until April, so keep your eyes on both the Pioneers website and our social accounts, and sign up to receive the Pioneers newsletter!

Until then, remember to always #MakeYourIdeas.

The post Pioneers Winners: Make Us Laugh Challenge appeared first on Raspberry Pi.


Source: RaspberryPi – IOT Anonimo

Source: Privacy Online


Source: Zologic

TekThing 118 – Ryzen Overclocked, Corsair H110i Liquid Cooler, Eufy RoboVac 11 vs Roomba, Nextcloud Raspberry Pi!

Nextcloud Raspberry Pi, Eufy RoboVac 11 vs Roomba, Corsair H110i Liquid Cooler, Ryzen 7 Overclocked W/ Benchmarks
—–
00:59 Galaxy S8 & Essential Android Phone,
Galaxy S8 launched March 29th, the day after we shot this video! Andy Rubin, the co-founder of Android, tweeted a tease of Essential’s first android phone.
http://www.samsung.com/global/galaxy/galaxy-s8/
https://twitter.com/Arubin/status/846396881668210688

02:47 LastPass Security Flaw
LastPass is securing a new vulnerability found by Google security researcher Tavis Ormandy. Details in the video!
https://blog.lastpass.com/2017/03/security-update-for-the-lastpass-extension.html/

03:57 Ryzen 7 1800X Overclocking, Corsair H110i GTX
We’ve got benchmarks from overclocking the Ryzen 7 1800X and review Corsair’s H110i GT Extreme Performance Liquid CPU Cooler. Can the H110i’s dual 140mm fans in Quiet mode cool as well as it’s super load Performance mode? Watch the video to find out!
https://www.amd.com/en/products/cpu/amd-ryzen-7-1800x
http://www.corsair.com/en-us/hydro-series-h110i-gt-280mm-extreme-performance-liquid-cpu-cooler

12:27 Your Web History Is For Sale!!!
Today’s Threat Wire brief is all about the Senate vote to remove FCC privacy rules, and we are recording this episode BEFORE the House vote… the EFF has a great guide to what might happen to your info if it passes!
https://theintercept.com/2017/03/23/the-senate-just-voted-to-sell-you-out-to-advertisers/
https://www.senate.gov/legislative/LIS/roll_call_lists/roll_call_vote_cfm.cfm?congress=115&session=1&vote=00094
https://www.eff.org/deeplinks/2017/03/five-creepy-things-your-isp-could-do-if-congress-repeals-fccs-privacy-protections

20:38 Eufy RoboVac vs Roomba 780!
Can the $187 Eufy RoboVac 11 defeat cat litter and household dirt as well as Shannon’s $400 iRobot Roomba 780? Watch the video!
http://amzn.to/2namQo1

31:54 Nextcloud, Syncloud, Raspberry Pi!!!
Kapil emails, “I’ve been using WD My Cloud for accessing my content at home from everywhere. It’s very reliable and worked flawlessly across different platform. Also, you can stream a big video and don’t have to download the video, very important! A new player in the picture is “Next cloud” https://nextcloud.com/ which allows you to set up your own cloud using a RaspberryPi.” We built a Nextcloud using Syncloud on the Raspberry Pi! Watch the video to find out what happened.
https://www.wdc.com/products/personal-cloud-storage/my-cloud.html
https://owncloud.org/
https://nextcloud.com/
http://syncloud.org/

41:10 Kid Coding Suggestions!
Roderick wrote ask@tekthing.com, “I just wanted to recommend Khan Academy’s Computing section. There are lessons on everything from JavaScript and HTML to cryptography.” Jacob adds, “I am a Software Engineer by profession and have done many “Hour Of Code” sessions for my children’s School STEM classes. And one of the best places for coding information for children starting at age 7-8 is http://www.coding.org if starting a little older (about 10-11 years old) https://codecombat.com/ was a huge hit.” Great stuff, thanks for writing in!

42:59 Do Something Analog
Like print out the Computer Hardware Chart 2.0 …OK, this isn’t analog at all, but it’ll stop any geek in their tracks if it’s hanging on the wall!
http://sonic840.deviantart.com/art/Computer-Hardware-Chart-2-0-587798335
——
——
Thank You Patrons! Without your support via patreon.com/tekthing, we wouldn’t be able to make the show for you every week!
https://www.patreon.com/tekthing
——
EMAIL US!
ask@tekthing.com
——
Amazon Associates: http://amzn.to/2gm9Egf
Subscribe: https://www.youtube.com/c/tekthing
——
Website: http://www.tekthing.com
RSS: http://feeds.feedburner.com/tekthing
THANKS!
HakShop: https://hakshop.myshopify.com/
——
SOCIAL IT UP!
Twitter: https://twitter.com/tekthing
Facebook: https://www.facebook.com/TekThing
Reddit: https://www.reddit.com/r/tekthingers
——

Source: Security news


Source: Zologic

Patch Unlikely for Widely Publicized Flaw in Microsoft IIS 6.0

Microsoft recommends upgrade to latest operating system for more protection.
Source: Vulnerabilitys & Threats

WAYS TO MAINTAIN YOUR CYBERSECURITY INFRASTRUCTURE

Network security is a great undertaking early on. The benefits to protecting your network are immediate as well as beneficial in the long term. However, the systems and practices which defend your organization and its network are not a “set it and forget it” machine. As threats are continually evolving, so must your defenses. Don’t let complacency set in to the point where you’re relying on an outdated cyber security infrastructure.

One component of a security plan that automatically outdates itself is antivirus software. While it is not enough to use SIEM alone, applications which defend the perimeter of your network by scanning for threats that fit its stored list of definitions is still a valid tactic. These applications are good at deflecting many known bots and known threats, unless software updates for definitions have lapsed. Outdated software is responsible for 9.3% malware infections of non-domain computers.

Running expired software will give you a false sense of security. Fortunately, outdated software is a very straight-forward problem to fix. Some updates can be loaded to a central console and set to sync to the definitions server automatically. In cases where computers have applications which prevent changes such as public browsing terminals, machines must be unfrozen and updated individually. Don’t let time consuming tasks prevent crucial maintenance; rather you should budget for the time and schedule the work regularly.

The email server can be a floodgate for trouble if not managed properly. Malware is often the first step in a hacker’s plan to get a foothold into a victim’s network. Once an initial error has occurred, installing malware via phishing for example, the whole system is compromised. Make sure you’re using a secure email server. Have strong password settings in place. Most importantly, encourage personal responsibility for individual email accounts. Have a protocol for evaluating unusual emails and forbid account sharing.

In general, you should be continually evaluating your strategy and practices before you have an outdated cybersecurity infrastructure. Here are the kinds of questions you should continually be asking:

Have new elements been added to the network?
Are we making use of our threat intelligence platform?
Does your configuration account for traffic created by mobile users?
Are the most sacred files sufficiently protected?
Even if an employee accesses cloud data from an infected home computer?

Are permissions current? Are procedures in place to ensure all employees credentials and email addresses are closed after they leave? Some businesses only remember to close this vulnerability when an employee makes a dramatic exit.

Outdated education is a problem for up to half of enterprises. Old information about the types of tactics hackers are using is as useful as outdated virus definitions. It’s a shame to waste effort on training sessions, presentations, and meetings if the information therein is outdated, inaccurate, or altogether lacking key topics.

Polls show only 46% of employers offer more education than a one-time refresher course. In order to remedy this, educators themselves must keep up on current best practices. Attending conferences allow security pros to immerse themselves and can help renew enthusiasm. Workshops, whitepapers and webinars are great for getting a deeper understanding of new threats and ways to combat them. Following cybersecurity blogs and reading trade publications should be done continually for consistent awareness. Learn how to get the most out of your particular tools by soliciting as much expertise from security vendor partners as possible.

Employees need continual ongoing education. The stakes are high enough that making a case for starting an education program should not be a hard sell. However, if there is a pushback, there is plenty of evidence that preventing ignorance-based vulnerabilities is a wise risk management strategy. If user education is not deemed important, you should consider the evidence that resolving a hack is very expensive and can take your business out of the game permanently.

Maintaining your cyber security infrastructure is an ongoing responsibility. Like maintaining a house, it is best to be proactive about keeping everything in good working order. If there is a possibility of a vulnerability or possible threat actor, address concerns before they become crises.


Source: Honeypot Tech

Incredible Raspberry Pi projects in issue 56 of The MagPi

Hi, Rob from The MagPi here! It’s the last Thursday of the month and that means there’s a new issue of the official Raspberry Pi magazine: yay!

MagPi Magazine 56 cover image

Grab your copy today!

The MagPi Magazine 56

The MagPi 56 covers some incredible Raspberry Pi projects built by members of our community, from simple things you can make quickly, like an easy robot or LEGO Pi case, to more advanced projects to experiment with, like a set of Pinoculars.

Our news section looks at some great new happenings in the world of Pi, such as the new Pimoroni kits for Zero W, the Cambridge theme for PIXEL, and our fifth birthday celebrations.

Also not to be missed in this issue is our lowdown of every Raspberry Pi operating system: which is your favourite? While you’re weighing up the pros and cons of Raspbian vs. Ubuntu MATE, you can also read about our DJ Hero harmonograph, some hot command line tips, and much more.

The MagPi is the only monthly magazine written by and for the Pi community. Regardless of your experience with the Raspberry Pi, there’s something for everyone.

Get your copy

You can grab the latest issue of The MagPi today from WHSmith, Tesco, Sainsbury’s, and Asda. Alternatively, you can order your copy online, or get it digitally via our app on Android and iOS. There’s even a free PDF of it as well.

We also have a fantastic subscription offer to celebrate the new Raspberry Pi Zero W: grab a twelve-month subscription and you’ll get a Raspberry Pi Zero W absolutely free, along with a free official case and a bundle of adapter cables. Get yours online right now!

MagPi Magazine Free Pi Zero W

Free Creative Commons download

As always, you can download your copy of The MagPi completely free. Grab it straight from the issue page for The MagPi 56.

Don’t forget, though, that, as with sales of the Raspberry Pi itself, all proceeds from the print and digital editions of the magazine go to help the Raspberry Pi Foundation achieve its charitable goals. Help us democratise computing!

We hope you enjoy the issue! That’s it until next month…

The post Incredible Raspberry Pi projects in issue 56 of The MagPi appeared first on Raspberry Pi.


Source: RaspberryPi – IOT Anonimo

Source: Privacy Online


Source: Zologic

ENISA’s Annual Privacy Forum

This year’s edition of ENISA’s Privacy Forum is organised in the light of the implementation of the newly promulgated General Data Protection Regulation (GDPR) and the recent EC proposal for a Regulation on Privacy and Electronic Communications. Even the best legislative efforts face the challenge of keeping up to speed with the pace of innovative technology and business models that challenge the way personal data is processed and privacy is protected across the EU and beyond; therefore examining what is at stake and where threats thereto originate from becomes of paramount importance.
Source: Cybersecurity and digital privacy newsletter

Source: Privacy Online


Source: Zologic

Hak5 2203 – Keybase Chat & A Hak5 Host Takeover!

In this episode of Hak5, we’ve got new hosts! Plus, is Keybase Chat the best new encrypted chat client?

Enjoy our early April Fool’s episode with special guests!

——————————-
Shop: http://www.hakshop.com
Support: http://www.patreon.com/threatwire
Subscribe: http://www.youtube.com/hak5
Our Site: http://www.hak5.org
Contact Us: http://www.twitter.com/hak5
Threat Wire RSS: https://shannonmorse.podbean.com/feed/
Threat Wire iTunes: https://itunes.apple.com/us/podcast/threat-wire/id1197048999

——————————

Hak5 1715 – Social Encryption with Keybase.io – https://www.youtube.com/watch?v=RRZiERo172k
Hak5 1904 – Easy File Encryption with Keybase – https://www.youtube.com/watch?v=S4HP1pRTE3A
Getting Started with the Keybase Client – https://keybase.io/getting-started
Keybase Chat Blog Announcement! – https://keybase.io/blog/keybase-chat
How to Install Keybase Chat on Linux – https://keybase.io/docs/the_app/install_linux
Keybase’s New Key Model – https://keybase.io/blog/keybase-new-key-model
Markdown Cheatsheet – https://github.com/adam-p/markdown-here/wiki/Markdown-Cheatsheet#code

http://www.HackAcrossThePlanet.com

Source: Security news


Source: Zologic

Roundtable meeting on cybersecurity in energy takes place in Rome

On 24 March, a high-level roundtable on the ‘Main Challenges for Cybersecurity in the Energy System’ took place as part of the Digital Day, the digital part of the celebrations marking the 60th anniversary of the Treaties of Rome and preparing for forthcoming G7 discussions on cybersecurity.
Source: Cybersecurity and digital privacy newsletter

Source: Privacy Online


Source: Zologic