Language Selection

English French German Italian Portuguese Spanish

Malicious Proprietary Software

Filed under
Microsoft
Software
  • Discord Is Not An Acceptable Choice For Free Software Projects

    Discord’s communication is not end to end (e2e) encrypted. It is encrypted only between the individual user and the servers operated by Discord Inc. Their spying extends to every single message sent and received by anyone, including direct messages betweeen users. The service can and does log every message sent, both in-channel and DMs. It is impossible to have a private conversation on Discord, as there will always be an unencrypted log of it stored by Discord. Discord can, at their option, provide those stored messages to any third party they wish, including cops or government snoops, for any reason, even without a legal order, without any obligation to tell you that they have done so.

  • [Attackers] Were Inside Citrix for Five Months

    Networking software giant Citrix Systems says malicious [attackers] were inside its networks for five months between 2018 and 2019, making off with personal and financial data on company employees, contractors, interns, job candidates and their dependents. The disclosure comes almost a year after Citrix acknowledged that digital intruders had broken in by probing its employee accounts for weak passwords.

  • [Vulnerable] firmware lurks inside Dell, HP and Lenovo computers amid supply chain security efforts

    “Firmware is meant to be invisible to the user, and so it’s not surprising that most people don’t pay attention to it,” said Eclypsium CEO Yuriy Bulgin. “However, these components make up the foundation upon which every device, operating system, and application depends.”

    Researchers used unsigned firmware to show how an attacker could compromise an operating system remotely in order to steal network data. The highlighted flaws could also enable “direct-memory access” attacks which exploit a computer’s core operating system.

  • Aera Launches Cognitive ‘Business Brain’ Operating System [Ed: This is NOT an 'operating system". Terms misused these days.]

    Infor labels one of its core brands Infor OS and quite unashamedly uses the term operating system to explain the function of its industry-specific Enterprise Resource Planning (ERP) and Supply Chain Management (SCM) cloud software. Mountain View headquartered Aera Technology has used a similar naming convention within its branding and called its automation-centric cloud platform the Aera Cognitive Operating System.

  • Microsoft Defender ATP for Linux Now In Public Preview

    Microsoft Defender ATP for Linux is now available in a public preview that allows administrators and security professionals to test the product in six different Linux distributions.

  • Keen to check for 'abnormal' user behaviours? Microsoft talks insider risk, AWS imports and compliance at infosec shindig RSA [Ed: “Microsoft talks insider risk”; but Microsoft is the risk]

    As well as widening the preview of Microsoft Threat Protection, a system aimed at a more automated response to threats, the gang has also extended the cross-platform support for Microsoft Defender Advanced Threat Protection (ATP) to include a whole bunch of Linux distributions.

  • Microsoft plans to add Linux support for Chromium-based Edge

    Microsoft fought long and hard to maintain and push its own proprietary browser, even launching Edge, hoping to get away from the stigma against Internet Explorer. However, the dominating market share of Chromium-based browsers finally got to Microsoft, and the company announced it would rebuild Edge with the Chromium source code. Last month, we reported that Microsoft’s Chromium-based Edge was out of development and ready for public deployment.

This week as well (still)

Microsoft binary blobs in "Linux" news

  • Microsoft Defender ATP coming to Linux

    Last week, we reported that Microsoft plans to add Linux support for Chromium-based Edge. This week, Microsoft announced that it will be bringing another of its services to Linux: Microsoft Defender Advanced Threat Protection, which the company describes as follows:

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

This week in KDE: all about the apps

This week we landed a lot of nice improvements for KDE’s apps, which I’ve highlighted below! Of course we didn’t forget about Plasma, so have a look-see... Read more

Rolando Blanco: Ubuntu Desktop Makeover

I must confess that since Ubuntu started, there have been a lot of changes that we have experienced on our desktop (each time for the better). However, I have always loved changing its appearance, to one more according to my particular tastes, sometimes up to 3 changes per year. This is one of the features that I like most about GNU / Linux, the freedom to adapt everything to my liking. This time, I wanted to make some slight changes in search of elegant minimalism. This is how I started testing a new icon pack and a tool that works as a widget and that animates my desktop, for this I used Conky. Read more

WiFi Goes Open

For most people, adding WiFi to a project means grabbing something like an ESP8266 or an ESP32. But if you are developing your own design on an FPGA, that means adding another package. If you are targeting Linux, the OpenWifi project has a good start at providing WiFi in Verilog. There are examples for many development boards and advice for porting to your own target on GitHub. You can also see one of the developers, [Xianjun Jiao], demonstrate the whole thing in the video below. The demo uses a Xilinx Zynq, so the Linux backend runs on the Arm processor that is on the same chip as the FPGA doing the software-defined radio. We’ll warn you that this project is not for the faint of heart. If you want to understand the code, you’ll have to dig into a lot of WiFi trivia. Read more

Kernel: Linux 5.8, Linux 5.7, FSGSBASE and HWMON

  • Improved EXT4 + XFS DAX Implementation Appears Ready To Go For Linux 5.8

    Adding to the expected changes for Linux 5.8 is improved EXT4 and XFS file-system direct access "DAX" support. DAX is the means of direct access to files backed by persistent memory (such as Intel Optane DC Persistent Memory) without needing to be copied via the page cache. Thus DAX bypasses that extra copy for reads/writes to the storage device and mapping the storage device directly into user-space.

  • The Top Linux 5.7 Features From Apple Fast Charge To Official Tiger Lake Graphics

    Assuming no last minute concerns, the Linux 5.7 kernel is set to debut as stable this weekend. Given all the weeks since the merge window and our many articles covering all the feature activity at that point (and not to be confused with our activity of new work being queued for the upcoming Linux 5.8 cycle), here is a look back at some of the top features of the Linux 5.7 kernel. Among the most interesting new features and improvements for Linux 5.7 include: - Intel Tiger Lake "Gen12" graphics are now enabled by default in being deemed stable enough for out-of-the-box support where as on prior kernels the support at the time was hidden behind a kernel module parameter.

  • Performance-Helping FSGSBASE Patches Spun For Linux A 13th Time

    The FSGSBASE Linux kernel patches that have the potential of helping performance going back to Intel Ivy Bridge era CPUs in select workloads have now hit their 13th revision to the series in the long-running effort to getting this support mainlined.

  • Linux's Hardware Monitoring "HWMON" Picking Up Notification Support

    In addition to the AMD Zen "amd_energy" driver coming for Linux 5.8, another late change now queued into hwmon staging is introducing notification support for the hardware monitoring subsystem. HWMON subsystem maintainer and Google employee Guenter Roeck has queued up notification support for this subsystem. This serves as a generic notification mechanism not only to notify user-space but also the thermal subsystem for any HWMON driver events. In the HWMON context, these events could be important like warnings/critical alarms over detected temperatures or voltages for different components.