More stories

  • in

    Jit and ZAP: Improving programming security

    iStockphoto/Getty Images Jit, a startup programming security company, dreams of being a top security power. To help make those dreams a reality, Jit recently hired Simon Bennetts, the founder of the world’s most popular web app security scanner, Open Web Application Security Project (OWASP) Zed Attack Proxy (ZAP). Simon Bennetts At Jit, Bennetts will continue […] More

  • in

    The 5 best walkie-talkies of 2022

    You may think walkie-talkies are a thing of the past since we have smartphones, but there are always situations where cellular connectivity is limited, or you may not want to buy your kid a smartphone just yet. ZDNET Recommends Walkie-talkies are great for communicating within a specific mile range, and while their primary function is just that, modern-day walkie-talkies have features like smartphone apps, severe weather alerts, flashlights, and more. We’ve rounded up the best walkie-talkies to help you communicate from anywhere easier.  Must read: More

  • in

    Is Amazon about to ruin Alexa answers with ads?

    Amazon Echo Dot (third-gen) Amazon I’m a product guy. Way back in the day I was actually a product marketing executive for a big tech company. I’ve shipped hundreds of products over the years. You always try to marry a need with a solution. Meet enough folks’ needs, and they’ll buy your product. Generally, though, […] More

  • in

    NSA and CISA: Here's how hackers are going after critical systems, and what you need to do about it

    Getty Images The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have issued an advisory explaining how to thwart cyberattacks on operational technology (OT) and industrial control system (ICS) assets.  The new joint advisory outlines what critical infrastructure operators should know about their opponents, citing recent cyber attacks on Ukraine’s energy […] More

  • in

    Why MFA matters: These attackers cracked admin accounts then used Exchange to send spam

    Image: Getty Images/iStockphoto Microsoft has exposed a crafty case of OAuth app abuse that allowed the attackers to reconfigure the victim’s Exchange server to send spam.      The point of the elaborate attack was to make mass spam – promoting a fake sweepstake – look like it originated from the compromised Exchange domain rather […] More

  • in

    Chainguard releases Wolfi, a Linux 'undistribution'

    Wright Studio/Shutterstock There are many Linux distributions designed expressly for containers. Even Microsoft has one, Common Base Linux (CBL)-Mariner. Others include Alpine Linux, Flatcar Container Linux, Red Hat Enterprise Linux CoreOS (RHCOS), and RancherOS. Now Chainguard, a cloud-native software security company, has a new take on this popular cloud-friendly kind of Linux: Wolfi, an “undistribution.”  […] More

  • in

    This Windows 11 security feature makes your PC 'very unattractive' to password hackers

    Image: Getty Images/Maskot Microsoft has introduced a new default to shield Windows 11 machines against password attacks which ought to make them “a very unattractive target” for hackers trying to steal credentials. The latest preview of Windows 11 ships with the SMB server authentication rate limiter on by default, making it much more time-consuming for […] More

  • in

    Programming languages: It's time to stop using C and C++ for new projects, says Microsoft Azure CTO

    Image: Deagreez/GETTY Mark Russinovich, the chief technology office (CTO) of Microsoft Azure, says developers should avoid using C or C++ programming languages in new projects and instead use Rust because of security and reliability concerns. Rust, which hit version 1.0 in 2020 and was born at Mozilla, is now being used within the Android Open […] More