Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • News (227)
  • Article (223)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 55 56 57 58 59 60 61 62 63 64 65 66 67 68 ... 148 Next »

13%
Hackers Infected DC Police Cameras Before Trump’s Inauguration
31.01.2017
Home »  News  » 
 
said ransomware left police cameras unable to record between Jan. 12 and Jan. 15. The cyberattack affected 123 of 187 network video recorders in a closed-circuit TV system for public spaces across
13%
Windows Helping the Spread of IoT Malware
15.02.2017
Home »  News  » 
 
, and once installed, the trojan scans the network for connected IoT devices. If it finds a vulnerable device, it compromises the device and uses it in later attacks. Last year in October, Mirai brought down
13%
OpenStack Pike Is Released
30.08.2017
Home »  News  » 
 
cases like edge computing and NFV (network functions virtualization) – is a marked distinction from proprietary on-premises offerings, or even earlier versions of OpenStack. The release is available
13%
Red Hat Starts Containerizing Its OpenStack Platform
06.11.2017
Home »  News  » 
 
Stack services, it has become easy to deploy a new implementation or perform an automated upgrade through its Director tool. Red Hat is also offering a containerized Technology Preview of certain networking
13%
Argonne Announces Call for Papers for the Exascale Aurora System
23.01.2018
Home »  HPC  »  News  » 
 
(Big Data, data-intensive computing, experimental/observational/simulation data analytics, etc.) and/or machine learning (deep learning, neural networks, discovery of patterns and reduced models
13%
Orangeworm, a New Hacking Group Targeting Healthcare Industry
24.04.2018
Home »  News  » 
 
to determine whether a researcher or a high-value target uses the system. If Orangworm finds that the victim is a person of interest, it moves in to infect other computers on the network. Kwampirs creates
13%
Flaws in the LTE Mobile Communication Standard
02.07.2018
Home »  News  » 
 
Forget about that suspicious attachment in your mail or some shady website installing malware on your system, now a flaw in LTE mobile communication protocol used with 4G networks enables remote
13%
Chinese Spy Chip in US Servers?
09.10.2018
Home »  News  » 
 
of rice, was allegedly installed by manufacturing sub-contractors in China. The report said that “the chips allowed the attackers to create a stealth doorway into any network that included the altered
13%
SUSE Adds SUSE Linux Enterprise to the Oracle Cloud Infrastructure
18.11.2019
Home »  News  » 
 
SUSE (a Gold-level member of Oracle PartnerNetwork) recently announced that SUSE Enterprise Linux is now a part of Oracle Cloud Infrastructure. This move also brings Oracle into the ever
13%
Vulnerable Docker Instance Sought Out by Monero Malware
02.12.2019
Home »  News  » 
 
was the amount of scans that occurred. During that campaign, hackers scanned up to 59,000 IP networks for exposed API endpoints. Once attackers located an exposed endpoint, an Alpine Linux OS container

« Previous 1 ... 55 56 57 58 59 60 61 62 63 64 65 66 67 68 ... 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice