Related Articles
DDoSers are abusing Microsoft RDP to make attacks more powerful
Enlarge / Hacker attacking server or database. Network security, Database secure and personal data protection (credit: Getty Images) DDoS-for-hire services are abusing the Microsoft Remote Desktop Protocol to increase the firepower of distributed denial-of-service attacks that paralyze websites and other online services, a security firm said this week. Typically abbreviated as RDP, Remote Desktop Protocol […]
New secret-spilling hole in Intel CPUs sends company patching (again)
Enlarge (credit: Intel) Intel is fixing a vulnerability that unauthorized people with physical access can exploit to install malicious firmware on the chip to defeat a variety of measures, including protections provided by Bitlocker, trusted platform modules, anti-copying restrictions, and others. The vulnerability—present in Pentium, Celeron, and Atom CPUs on the Apollo Lake, Gemini Lake, […]
New analysis confirms hypothesis for source of mysterious auroral “dunes”
Revisiting the aurora “dunes”: A time-lapse video recorded by a Scottish aurora borealis hobbyist Graeme Whipps was used to determine the speed of the phenomenon at over 200 m/s. Several years ago, amateur astronomers first spotted a rare type of aurora nicknamed “the dunes” because of its luminous, rolling wave patterns. Last year, astronomers proposed […]