Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Google AI teaches itself ‘superhuman’ chess skills in four hours

Google’s “superhuman” AlphaZero artificial intelligence (AI) taught itself chess from scratch in four hours. Then, it wiped the floor with the former world-leading chess software, Stockfish 8.  Out of 100 matches, AlphaZero won 28 games and drew (tied) the remaining 72.


So long AOL Instant Messenger

As AIM rides off into the sunset, let’s reflect on its role in preparing people for today’s digital messaging methods.


Hidden keylogger found on HP laptops  ITProPortal

 

Full coverage


 TA14-017A: UDP-Based Amplification Attacks

Original release date: January 17, 2014  Updated on: December 4, 2017

Systems Affected

Certain application-layer protocols that rely on the User Datagram Protocol (UDP) have been identified as potential attack vectors. These include

  • Domain Name System (DNS),
  • Network Time Protocol (NTP),
  • Connection-less Lightweight Directory Access Protocol (CLDAP),
  • Character Generator Protocol (CharGEN),
  • Simple Service Discovery Protocol (SSDP),
  • BitTorrent,
  • Simple Network Management Protocol version 2 (SNMPv2),
  • Kad,
  • Portmap/Remote Procedure Call (RPC),
  • Quote of the Day (QOTD),
  • Multicast Domain Name System (mDNS),
  • Network Basic Input/Output System (NetBIOS),
  • Quake Network Protocol,
  • Steam Protocol,
  • Routing Information Protocol version 1 (RIPv1), and
  • Lightweight Directory Access Protocol (LDAP).

Read more…


Common Ports

Download as PDF

0

About the Author:

Cybersecurity guru to business owners in the St Paul, Minneapolis, and western Wisconsin area. Computer security and hacking have been a passion of mine since I entered the computer and networking business in 2000. In 2013 I completed a course of study and certification exam to become a Certified Ethical Hacker (CEH). In 2016 I was certified as a Certified Information Systems Security Professional (CISSP). As Senior Cybersecurity Engineer at Computer Integration Technologies, I help our clients experience high levels of computer security, network security, and web site security. In addition to consulting on security products and services, we also conduct security audits, vulnerability assessments and full penetration tests. We also provide Cybersecurity Awareness Training for clients and their employees. We also work with companies and organizations that need to certify compliance with regulations such as PCI-DSS (credit card processing), HIPAA/HITECH (medical records), and GLBA. The views expressed on this Web site are mine alone and do not necessarily represent the views of my employer.

Add a Comment