Windows Server will add the Linux subsystem, join the Insider program

(credit: Microsoft) SEATTLE—When Microsoft first introduced the Windows Subsystem for Linux (WSL) at last year’s Build developer conference , it said that it was doing so to make developers who were familiar with the Linux command line feel comfortable on Windows . The immediate and inevitable question was “Well, what about Windows Server?” Development is one thing, but what if organizations wanted to occasionally deploy their Linux software on Windows? Although Windows Server 2016 and Windows 10 share many components, the Server operating system hasn’t thus far included WSL, consistent with the “developer only” rationale. But that’s going to change: at Build this week, Microsoft announced that WSL will be included in Server later this year. Microsoft still isn’t positioning this as a way of running Linux server in production on Windows; rather, the company says the addition will be useful for administrative tasks. With WSL, Windows can run scripts written for Linux. But we’re hard-pressed to see things stopping there; it seems inevitable that at some point, Windows will offer the ability to run Linux server software as one of its features. Read 3 remaining paragraphs | Comments

View article:
Windows Server will add the Linux subsystem, join the Insider program

Researchers Find New Version Of WanaDecrypt0r Ransomware Without A Kill Switch

Remember that “kill switch” which shut down the WannCry ransomware? An anonymous reader quotes Motherboard: Over Friday and Saturday, samples of the malware emerged without that debilitating feature, meaning that attackers may be able to resume spreading ransomware even though a security researcher cut off the original wave. “I can confirm we’ve had versions without the kill switch domain connect since yesterday, ” Costin Raiu, director of global research and analysis team at Kaspersky Lab told Motherboard on Saturday… Another researcher confirmed they have seen samples of the malware without the killswitch. Read more of this story at Slashdot.

View article:
Researchers Find New Version Of WanaDecrypt0r Ransomware Without A Kill Switch

Researchers Find New Version Of WanaDecrypt0r Ransomware Without A Kill Switch

Remember that “kill switch” which shut down the WannCry ransomware? An anonymous reader quotes Motherboard: Over Friday and Saturday, samples of the malware emerged without that debilitating feature, meaning that attackers may be able to resume spreading ransomware even though a security researcher cut off the original wave. “I can confirm we’ve had versions without the kill switch domain connect since yesterday, ” Costin Raiu, director of global research and analysis team at Kaspersky Lab told Motherboard on Saturday… Another researcher confirmed they have seen samples of the malware without the killswitch. Read more of this story at Slashdot.

Visit link:
Researchers Find New Version Of WanaDecrypt0r Ransomware Without A Kill Switch

New Ransomware ‘Jaff’ Spotted; Malware Groups Pushing 5M Emails Per Hour To Circulate It

An anonymous reader writes: The Necurs botnet has been harnessed to fling a new strain of ransomware dubbed “Jaff”. Jaff spreads in a similar way to the infamous file-encrypting malware Locky and even uses the same payment site template, but is nonetheless a different monster. Attached to dangerous emails is an infectious PDF containing an embedded DOCM file with a malicious macro script. This script will then download and execute the Jaff ransomware. Locky — like Jaff — also used the Necurs botnet and a booby-trapped PDF, security firm Malwarebytes notes. “This is where the comparison ends, since the code base is different as well as the ransom itself, ” said Jerome Segura, a security researcher at Malwarebytes. “Jaff asks for an astounding 2 BTC, which is about $3, 700 at the time of writing.” Proofpoint reckons Jaff may be the work of the same cybercriminals behind Locky, Dridex and Bart (other nasty malware) but this remains unconfirmed. And Forcepoint Security Labs reports that malicious emails carrying Jaff are being cranked out at a rate of 5 million an hour on Thursday, or 13 million in total at the time it wrote up a blog post about the new threat. Read more of this story at Slashdot.

More:
New Ransomware ‘Jaff’ Spotted; Malware Groups Pushing 5M Emails Per Hour To Circulate It

Windows Server will add the Linux subsystem, join the Insider program

(credit: Microsoft) SEATTLE—When Microsoft first introduced the Windows Subsystem for Linux (WSL) at last year’s Build developer conference , it said that it was doing so to make developers who were familiar with the Linux command line feel comfortable on Windows . The immediate and inevitable question was “Well, what about Windows Server?” Development is one thing, but what if organizations wanted to occasionally deploy their Linux software on Windows? Although Windows Server 2016 and Windows 10 share many components, the Server operating system hasn’t thus far included WSL, consistent with the “developer only” rationale. But that’s going to change: at Build this week, Microsoft announced that WSL will be included in Server later this year. Microsoft still isn’t positioning this as a way of running Linux server in production on Windows; rather, the company says the addition will be useful for administrative tasks. With WSL, Windows can run scripts written for Linux. But we’re hard-pressed to see things stopping there; it seems inevitable that at some point, Windows will offer the ability to run Linux server software as one of its features. Read 3 remaining paragraphs | Comments

See more here:
Windows Server will add the Linux subsystem, join the Insider program

New Ransomware ‘Jaff’ Spotted; Malware Groups Pushing 5M Emails Per Hour To Circulate It

An anonymous reader writes: The Necurs botnet has been harnessed to fling a new strain of ransomware dubbed “Jaff”. Jaff spreads in a similar way to the infamous file-encrypting malware Locky and even uses the same payment site template, but is nonetheless a different monster. Attached to dangerous emails is an infectious PDF containing an embedded DOCM file with a malicious macro script. This script will then download and execute the Jaff ransomware. Locky — like Jaff — also used the Necurs botnet and a booby-trapped PDF, security firm Malwarebytes notes. “This is where the comparison ends, since the code base is different as well as the ransom itself, ” said Jerome Segura, a security researcher at Malwarebytes. “Jaff asks for an astounding 2 BTC, which is about $3, 700 at the time of writing.” Proofpoint reckons Jaff may be the work of the same cybercriminals behind Locky, Dridex and Bart (other nasty malware) but this remains unconfirmed. And Forcepoint Security Labs reports that malicious emails carrying Jaff are being cranked out at a rate of 5 million an hour on Thursday, or 13 million in total at the time it wrote up a blog post about the new threat. Read more of this story at Slashdot.

Read more here:
New Ransomware ‘Jaff’ Spotted; Malware Groups Pushing 5M Emails Per Hour To Circulate It

Researchers Find New Version Of WanaDecrypt0r Ransomware Without A Kill Switch

Remember that “kill switch” which shut down the WannCry ransomware? An anonymous reader quotes Motherboard: Over Friday and Saturday, samples of the malware emerged without that debilitating feature, meaning that attackers may be able to resume spreading ransomware even though a security researcher cut off the original wave. “I can confirm we’ve had versions without the kill switch domain connect since yesterday, ” Costin Raiu, director of global research and analysis team at Kaspersky Lab told Motherboard on Saturday… Another researcher confirmed they have seen samples of the malware without the killswitch. Read more of this story at Slashdot.

Visit link:
Researchers Find New Version Of WanaDecrypt0r Ransomware Without A Kill Switch

Researchers Find New Version Of WanaDecrypt0r Ransomware Without A Kill Switch

Remember that “kill switch” which shut down the WannCry ransomware? An anonymous reader quotes Motherboard: Over Friday and Saturday, samples of the malware emerged without that debilitating feature, meaning that attackers may be able to resume spreading ransomware even though a security researcher cut off the original wave. “I can confirm we’ve had versions without the kill switch domain connect since yesterday, ” Costin Raiu, director of global research and analysis team at Kaspersky Lab told Motherboard on Saturday… Another researcher confirmed they have seen samples of the malware without the killswitch. Read more of this story at Slashdot.

More:
Researchers Find New Version Of WanaDecrypt0r Ransomware Without A Kill Switch

Windows Server will add the Linux subsystem, join the Insider program

(credit: Microsoft) SEATTLE—When Microsoft first introduced the Windows Subsystem for Linux (WSL) at last year’s Build developer conference , it said that it was doing so to make developers who were familiar with the Linux command line feel comfortable on Windows . The immediate and inevitable question was “Well, what about Windows Server?” Development is one thing, but what if organizations wanted to occasionally deploy their Linux software on Windows? Although Windows Server 2016 and Windows 10 share many components, the Server operating system hasn’t thus far included WSL, consistent with the “developer only” rationale. But that’s going to change: at Build this week, Microsoft announced that WSL will be included in Server later this year. Microsoft still isn’t positioning this as a way of running Linux server in production on Windows; rather, the company says the addition will be useful for administrative tasks. With WSL, Windows can run scripts written for Linux. But we’re hard-pressed to see things stopping there; it seems inevitable that at some point, Windows will offer the ability to run Linux server software as one of its features. Read 3 remaining paragraphs | Comments

See the original article here:
Windows Server will add the Linux subsystem, join the Insider program

Researchers Find New Version Of WanaDecrypt0r Ransomware Without A Kill Switch

Remember that “kill switch” which shut down the WannCry ransomware? An anonymous reader quotes Motherboard: Over Friday and Saturday, samples of the malware emerged without that debilitating feature, meaning that attackers may be able to resume spreading ransomware even though a security researcher cut off the original wave. “I can confirm we’ve had versions without the kill switch domain connect since yesterday, ” Costin Raiu, director of global research and analysis team at Kaspersky Lab told Motherboard on Saturday… Another researcher confirmed they have seen samples of the malware without the killswitch. Read more of this story at Slashdot.

Continued here:
Researchers Find New Version Of WanaDecrypt0r Ransomware Without A Kill Switch