Would you hire a convicted hacker? David Berlind presents a selection of what ZDNet readers said when they were asked
By ZDNet UK
| September 29, 2004 -- 10:35 GMT (03:35 PDT)
| Topic: Security
Unusual tech idols, so many Raspberry Pis, pioneer mobiles, luxury smartwatches, failed launches: Photos
3D body parts, iPhone privacy, tech's undead, vintage Macs, drool-worthy canteen food and more: Photos of the month
Robot dog, best AI films, iPhone 6 launch, Cold War bunker, email overload: Photos of the month
3D sweets, bots for tots, see-through trucks, Arduino pianos, and more: Photos
Zero-day in popular jQuery plugin actively exploited for at least three years
A fix is out but the plugin is used in hundreds, if not thousands, of projects. Patching will take ages!
Canberra competence shines in day of PM domain lapses and tortured analogies
If you can't set up a process to renew a domain, can you be trusted to run an economy?
Flaws in telepresence robots allow hackers access to pictures, video feeds
Vendor has patched two of five reported bugs. Three patches are in the works.
Open source web hosting software compromised with DDoS malware
Some VestaCP servers were infected with a new malware strain named Linux/ChachaDDOS.
GitHub security alerts now support Java and .NET projects
GitHub also launches Token Scanning tool and new Security Advisory API.
Apple to US users: Here's how you can now see what personal data we hold on you
Apple's privacy tools now go beyond Europe, so more now get to download the personal data it has collected.
Senate inquiry recommends locking down My Health Record by default
Oceansalt cyberattack wave linked to defunct Chinese APT Comment Crew
The source code of malware from the ancient Chinese military-affiliated group appears to have changed hands.
MIT invention builds memory walls to protect against Meltdown, Spectre attacks
The new system could potentially prevent similar memory-based attacks from risking our PCs and global services.