Plex Media Servers Are Being Abused For DDoS Attacks

DDoS-for-hire services have found a way to abuse Plex Media servers to bounce junk traffic and amplify distributed denial of service (DDoS) attacks, security firm Netscout said in an alert this week. From a report: The company’s alert warns owners of devices that ship with Plex Media Server, a web application for Windows, Mac, and Linux that’s usually used for video…

The Open-Source Magma Project Will Become 5G’s Linux

An anonymous reader quotes a report from ZDNet: Magma was developed by Facebook to help telecom operators deploy mobile networks quickly and easily. The project, which Facebook open-sourced in 2019, does this by providing a software-centric distributed mobile packet core and tools for automating network management. This containerized network function integrates with the existing back end of a mobile network and…

Ubiquiti Tells Customers To Change Passwords After Security Breach

An anonymous reader quotes a report from ZDNet: Networking equipment and IoT device vendor Ubiquiti Networks has sent out today notification emails to its customers informing them of a recent security breach. “We recently became aware of unauthorized access to certain of our information technology systems hosted by a third party cloud provider,” Ubiquiti said in emails today. The servers stored…

Wasmer 1.0 Can Run WebAssembly ‘Universal Binaries’ on Linux, MacOS, Windows, Android, and iOS

The WebAssembly portable binary format will now have wider support from Wasmer, the server-side runtime which “allows universal binaries compiled from C++, Rust, Go, Python, and other languages to run on different operating systems and in web browsers without modification,” reports InfoWorld: Wasmer can run lightweight containers based on WebAssembly on a variety of platforms — Linux, MacOS, Windows, Android, iOS…

How Sabelo applied lessons from online learning to found his own tech company in South Africa

Meet Sabelo, the co-founder and CEO of Tuse, a company based in South Africa that offers award-winning artificial intelligence, blockchain, and IoT solutions. Prior to his success with Tuse, Sabelo spent eight years as a self-taught developer. He eventually determined that he needed additional training if he was to achieve his goal of launching his […]
The post How Sabelo applied lessons…

Academics Turn RAM Into Wi-Fi Cards To Steal Data From Air-Gapped Systems

Academics from an Israeli university have published new research today detailing a technique to convert a RAM card into an impromptu wireless emitter and transmit sensitive data from inside a non-networked air-gapped computer that has no Wi-Fi card. From a report: Named AIR-FI, the technique is the work of Mordechai Guri, the head of R&D at the Ben-Gurion University of the…

NextMind’s Brain-Computer Interface Kit Begins Shipping To Developers

“Don a headset which places a sensor on the back of your head, and it’ll detect your brainwaves which can then be translated into digital actions,” writes Engadget. VentureBeat reports that NextMind “has started shipping its real-time brain computer interface Dev Kit for $399.”
The device translates brain signals into digital commands, allowing you to control computers, AR/VR headsets, and IoT devices…

US Congress Passes an IoT Security Bill ‘That Doesn’t Totally Suck’

Shotgun (Slashdot reader #30,919) shared these thoughts from The Register: Every now and again the U.S. Congress manages to do its job and yesterday was one of those days: the Senate passed a new IoT cybersecurity piece of legislation that the House also approved, and it will now move to the President’s desk. As we noted back in March when the…

Over 100 Irrigation Systems Left Exposed Online Without a Password

More than 100 smart irrigation systems were left exposed online without a password last month, allowing anyone to access and tamper with water irrigation programs for crops, tree plantations, cities, and building complexes. From a report: The exposed irrigation systems were discovered by Security Joes, a small boutique security firm based in Israel. All were running ICC PRO, a top-shelf smart…

Canonical Introduces High-Availability Micro-Kubernetes

An anonymous reader quotes a report from ZDNet: If you’ve been hiding under a rock — and who could blame you these days? — you may have missed how totally Kubernetes now dominates container orchestration. One way to quickly get up to speed on Kubernetes is with Canonical’s MicroK8s. This is an easy-to-run and install mini-version of Kubernetes. And now Canonical…