Language Selection

English French German Italian Portuguese Spanish

Security Leftovers

Filed under
  • A Step Forward for Security [iophk: "end point compromise negates many theoretical advantages"]

    While we are all mesmerized by the presidential crises, a small, but quite significant change occurred in Congress: the Senate Sergeant at Arms approved the use of Signal by Senate staff. Signal, a product of Open Whisper Systems, provides end-to-end encryption for Apple and Android phones.

  • Why Europe’s dependency on Microsoft is a huge security risk

    On May 12, hackers hit more than a hundred countries, exploiting a stolen N.S.A. tool that targeted vulnerabilities of Microsoft software. The attacks infected only machines running on Windows operative system. Among the victims are public administrative bodies such as NHS hospitals in the UK. Investigate Europe spent months to investigate the dire dependency of European countries on Microsoft – and the security risks this entails

  • NSA told Microsoft about stolen exploits: officials

    Current and former NSA officials say the agency informed Microsoft about the theft of the exploit named EternalBlue after learning of it, making it possible for the Redmond software giant to issue a patch for it in March. The exploit was used in the WannaCry ransomware attacks over last weekend.

  • Shadow Brokers claims Microsoft hand-in-glove with NSA

    The group that released NSA exploits for Windows, which were used in massive ransomware attacks last weekend, has accused Microsoft of being hand-in-glove with The Equation Group, a group that is believed to be a front for the NSA.

  • NSA officials worried about the day its potent hacking tool would get loose. Then it did.

    But for more than five years, the NSA kept using it — through a time period that has seen several serious security breaches — and now the officials' worst fears have been realized. The malicious code at the heart of the WannaCry virus that hit computer systems globally late last week was apparently stolen from the NSA, repackaged by cybercriminals and unleashed on the world for a cyberattack that now ranks as among the most disruptive in history.

  • Shadow Brokers threaten to unleash more hacking tools

    The so-called Shadow Brokers, who claimed responsibility for releasing NSA tools that were used to spread the WannaCry ransomware through the NHS and across the world, said they have a new suite of tools and vulnerabilities in newer software. The possible targets include Microsoft's Windows 10, which was unaffected by the initial attack and is on at least 500m devices around the world.

More in Tux Machines

Type Title Author Replies Last Postsort icon
Story Node.js Is Now Available as a Snap on Ubuntu, Other GNU/Linux Distributions Rianne Schestowitz 22/03/2018 - 8:37pm
Story Modular PLC platform runs Linux on Allwinner H5 Rianne Schestowitz 22/03/2018 - 8:33pm
Story today's leftovers Roy Schestowitz 22/03/2018 - 5:46pm
Story U-Boot 2018.03 Released Roy Schestowitz 22/03/2018 - 5:41pm
Story Latest of Openwashing Roy Schestowitz 22/03/2018 - 5:40pm
Story Games: Valve, Modernisation in Google Summer of Code, Trigger Happy Havoc Roy Schestowitz 22/03/2018 - 5:38pm
Story Red Hat and Fedora Roy Schestowitz 22/03/2018 - 5:33pm
Story Android Leftovers Rianne Schestowitz 22/03/2018 - 5:15pm
Story Raspberry Pi 3 Model B+ Benchmarks Rianne Schestowitz 22/03/2018 - 5:08pm
Story Stable kernels 4.9.89, 4.4.123 and 3.18.101 Rianne Schestowitz 22/03/2018 - 5:05pm