Security and Proprietary Issues
-
10 open source cloud security tools to know [Ed: The moment you choose 'clown computing' you've already disowned your own infrastructure and lost privacy, security, control. So this is sort of missing the point of "open" (the environment itself is proprietary).]
Pacu is written in Python and maintained by Rhino Security Labs, a penetration testing provider.
-
Cisco security breach hits corporate servers that ran unpatched software
Six servers Cisco uses to provide a virtual networking service were compromised by hackers who exploited critical flaws contained in unpatched versions the open source software service relies on, the company disclosed on Thursday.
-
Zoom to Strengthen Encryption for Paying Customers: Reuters
In response to queries, Zoom pointed to its May 27 report that said its focus is to build the so-called end-to-end encryption for its meeting product, which may be later rolled out for its chat, phone and webinar offerings. “Only our paid users will have access to end-to-end encryption for their meetings,” it said. “However, all users will use the 256-bit GCM encryption on May 30 regardless of their license type.”
-
Zoom paid accounts reportedly will get strong encryption for calls
Zoom published a draft paper May 22nd outlining some of its encryption plans.
-
Zoom Publishes Draft Design of End-to-End Encryption Offering
Once we have assessed this feedback for integration into a final design, we will announce our engineering milestones and goals for deploying an end-to-end encryption offering for Zoom users.
-
Exclusive: Zoom plans to roll out strong encryption for paying customers
The company, whose business has boomed with the coronavirus pandemic, discussed the move on a call with civil liberties groups and child-sex abuse fighters on Thursday, and Zoom security consultant Alex Stamos confirmed it on Friday.
In an interview, Stamos said the plan was subject to change and it was not yet clear which, if any, nonprofits or other users, such as political dissidents, might qualify for accounts allowing more secure video meetings.
He added that a combination of technological, safety and business factors went into the plan, which drew mixed reactions from privacy advocates.
-
NHS contact tracing undermined by hackers sending fraudulent warnings to public
The new NHS test and trace programme is being undermined by hackers sending out phishing scams falsely warning the public they may have Covid-19.
Public Health England have warned potential contacts to check suspicious messages against the Government website after a flurry of reports of Britons being falsely informed they may have coronavirus.
- Login or register to post comments
- Printer-friendly version
- 5563 reads
- PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
digiKam 7.7.0 is releasedAfter three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. |
Dilution and Misuse of the "Linux" Brand
|
Samsung, Red Hat to Work on Linux Drivers for Future TechThe metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. |
today's howtos
|
Recent comments
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago