Baanboard.com

Go Back   Baanboard.com > News

User login

Frontpage Sponsor

Main

Poll
How big is your Baan-DB (just Data AND Indexes)
0 - 200 GB
16%
200 - 500 GB
28%
500 - 800 GB
2%
800 - 1200 GB
9%
1200 - 1500 GB
9%
1500 - 2000 GB
14%
> 2000 GB
21%
Total votes: 43

Baanboard at LinkedIn


Reference Content

 
RSS Newsfeeds

The Weird Rise of Cyber Funerals

Slashdot - 22 min 8 sec ago
Categories: Geek, Opinion

Could hackers 'brainjack' your memories in future?

BBC Technology News - 3 hours 6 min ago
A decade from now, memory-boosting implants could be available commercially, but at what risk?

Comic for February 18, 2019

Dilbert - 3 hours 9 min ago
Categories: Geek

Another blow to Blu-ray: Samsung will no longer make Blu-ray players for the US

Ars Technica - February 18, 2019 - 11:37pm

If you didn’t notice any Blu-ray player announcements from Samsung at CES this year, there’s a reason for that: the company has told both Forbes and CNET that it is getting out of the Blu-ray player business in the United States.

The large chaebol conglomerate will introduce no new Blu-ray players anywhere, it seems, and will stop making existing players for the US market. This comes as a confirmation of what many observers expected, given that the company last released a new player in 2017. Samsung was reportedly working on a high-end Blu-ray player for release in 2019, according to Forbes, but those plans have been scrapped.

Samsung didn't tell either publication why it decided to exit the business, and there is probably no big, single reason for this shift. But there are a lot of small ones.

Read 5 remaining paragraphs | Comments

Inside the DNSpionage hacks that hijack domains at an unprecedented scale

Ars Technica - February 18, 2019 - 10:48pm

Enlarge (credit: Lion Kimbro)

Since the beginning of the year, the US government and private security companies have been warning of a sophisticated wave of attacks that’s hijacking domains belonging to multiple governments and private companies at an unprecedented scale. On Monday, a detailed report provided new details that helped explain how and why the widespread DNS hijackings allowed the attackers to siphon huge numbers of email and other login credentials.

The article, published by KrebsOnSecurity reporter Brian Krebs, said that, over the past few months, the attackers behind the so-called DNSpionage campaign have compromised key components of DNS infrastructure for more than 50 Middle Eastern companies and government agencies. Monday’s article goes on to report that the attackers, who are believed to be based in Iran, also took control of domains belonging to two highly influential Western services—the Netnod Internet Exchange in Sweden and the Packet Clearing House in Northern California. With control of the domains, the hackers were able to generate valid TLS certificates that allowed them to launch man-in-the-middle attacks that intercepted sensitive credentials and other data.

Short for domain name system, DNS acts as one of the Internet’s most fundamental services by translating human-readable domain names into the IP addresses one computer needs to locate other computers over the global network. DNS hijacking works by falsifying the DNS records to cause a domain to point to an IP address controlled by a hacker rather than the domain’s rightful owner. DNSpionage has taken DNS hijacking to new heights, in large part by compromising key services that companies and governments rely on to provide domain lookups for their sites and email servers.

Read 13 remaining paragraphs | Comments


All times are GMT +2. The time now is 05:09.


©2001-2018 - Baanboard.com - Baanforums.com