A Linux botnet has grown so powerful that it can generate crippling distributed denial-of-service attacks at over 150 Gbps, many times greater than a typical company's infrastructure can withstand.
Docker may not be the solution to ending world hunger, But the recent myriad of strange and remarkable use cases for it might have you thinking otherwise. From managing Rasberry Pi clusters to facilitiating genome sequencing and cancer research, These top 10 weird and wonderful uses for Docker illustrate the technology's amazing versatility across a variety of innovative and irreverant applications.
1. Create your own GitHub-like service.
CoreOS making it one step easier to use Kubernetes on AWS. They a are releasing an official CloudFormation for launching Kubernetes on AWS, As well as kube-aws, A tool CoreOS developed to assist you in automating your cluster deployment. kube-aws makes it easy to configure end-user tools like kubectl.
By using CloudFormation and kube-aws, You get an officially supported deployment that integrates with elastic load balancing for Kubernetes services, Auto-scaling groups for resizes the cluster and a TLS between the Kubernetes API and users interacting with kubectl.
A network of compromised Linux servers has grown so powerful that it can blow large websites off the Internet by launching crippling Distributed Denial-of-service (DDoS) attacks of over 150 gigabits per second (Gbps).
On Sep 18th, Symantec silently posted a blog entitled "A Tough Day as Leaders". The statment marks with "a small number of test certificates were inappropriately issued internally this week for three domains during product testing." Synamtec didn't reveal which 3 domain they were referring to. According to statement issued by Symantec - "There was no direct impact to any of the domains and never any danger to the Internet.
Microsoft's Skype app experienced a major service outage on Monday morning. The company has acknowledged the outage in their twitter account and currently working to resolve, the problems remain stretched on for several hours. Finally the issue has came to halt.
We are working to fix an issue which is preventing some users from logging in & using Skype. We apologize for any inconvenience.
— Skype (@Skype) September 21, 2015
According to the draft policy (download PDF), users of services that use encryption to secure communication, such as WhatsApp and other instant messaging services, could be required to store all their communication for as long as 90 days and make them available to law enforcement agencies when legally asked to.
The thehackernews reports that a Large number of WordPress websites were compromised in last two weeks with a new malware campaign spotted in the wild. WordPress, a Free and Open source content management system (CMS) and blogging tool, has been once again targeted by hackers at large scale. Researchers at Sucuri Labs have detected a “Malware Campaign” with an aim of getting access to as many devices they can by making innumerable WordPress websites as its prey.
On January 27, 2015, a GNU C Library (glibc) vulnerability, referred to as the GHOST vulnerability, was announced to the general public. In summary, the vulnerability allows remote attackers to take complete control of a system by exploiting a buffer overflow bug in glibc's GetHOST functions (hence the name). Like Shellshock and Heartbleed, this vulnerability is serious and affects many servers.