Web Hosting Talk Insider Dedicated servers for your business
19 February, 2016
Newsletter issue 21

We’re starting off 2016 with an issue packed with news and useful info to help you start the year right. First on our article roster is a list of the top tech trends seen in the Consumer and Electronic Show (CES) in Las Vegas last month. Second is another list of the threat you need to look out for in 2016. While you’re at it rethinking your digital security, it may also be a good idea to do some password spring-cleaning with this article on the 25 Most Common Passwords that you should not use.

Looks like the big media companies are doing some spring cleaning of their own as Netflix announced it would start blocking VPN users who try to access the Netflix content of countries other than their own.

On the vulnerability front, a critical Linux vulnerability (CVE-2016-0728) affecting versions 3.8 and higher was found and patched.

Have a nice weekend!

Your account manager,
Natalia

In this issue

Top Tech Trends in CES 2016

The annual consumer technology conference that is CES kicked off in the Las Vegas, Nevada at the beginning of January. Here are the top technology trends reported by Mashable, The Verge, and Inc.:

  • Drone anything is everything.
  • Mobile health–tracking devices are the top dogs in the Internet of Things.
  • Smart home appliances will get homes more connected than ever.
  • Electric cars are here, really.
  • Virtual reality (VR) is expanding.

Read more about each here.


Threat Predictions for 2016 from Security Experts

Security companies and various tech publications have posted their predictions of the security threats that will likely plagued 2016. Below are the three most common predictions made by experts:

  • Expansion on both attacks and security awareness for the Internet of Things (IoT).
  • Digital extortion attacks and ransomware will up their games, becoming more ‘personal’, with more sophisticated evasion tactics.
  • Data breaches will continue and companies will start to look to cyber insurance, asset enumeration, and being extra careful in allowing 3rd-party access.

Read more here.

25 Most Common Passwords You Should Not Use

In January Password security company SplashData released their annual list of the “Worst Passwords” or the most common passwords used based on 3.3 million leaked passwords in 2014. Top 5 are the following:

  • 123456 (Unchanged from 2013)
  • password (Unchanged)
  • 12345 (Up 17)
  • 12345678 (Down 1)
  • qwerty (Down 1)
Check the whole list and find some tips on how to create a strong password here.

Netflix to Block VPN Users From Other Countries

In mid January Netflix announced that it would start cracking down on accounts that use VPN to access geographically restricted. In the statement, Netflix said that it would start blocking by detecting VPN proxies. This move is in response to increasing pressure from content owners for Netflix to enforce country-licensing restrictions. Rival streaming service Hulu is already actively blocking geo-hopping VPNs.

As yet, no date has been released on when Netflix will start to carry out its VPN-blocking scheme.

Continue reading

Critical Linux Kernel Flaw Discovered

In late January security startup Perception Point reported a critical Linux vulnerability (CVE-2016-0728) affecting versions 3.8 and higher. What makes this particular kernel flaw stand out is that it also affects Android devices running Kit-Kat or higher. To exploit the vulnerability, a malicious user needs local access on a Linux server. Specifically, the bug is in the keychain facility, which is built into several flavors of Linux.

Continue reading
 Maintenance Schedule
No maintenances scheduled for the next month.

Check Maintenance schedules in your Client Area for updates.
 
 Joke of the Week
I intend to live forever.
So far, so good. (Steve Wright)
 
 Quick Links
FAQ
Latest News
Knowledge Base
Contact Us
Newsletter archive
 
 Follow us and Stay Tuned for our Special Offers
 
Alnitech on Twitter Like Alnitech on Facebook
Alnitech on LinkedIn
 
 Trending Articles
IPMI Сlient Access Manual
How to reinstall OS using IPMI or PXE boot
How to create VMs on XEN Server
Installing SolusVM
 

Got suggestions? Send us an e-mail:
suggestions@alnitech.com

Subscribe to Newsletters

One-Click Unsubscribe

Copyright © 2016 Alnitech.
All rights reserved.