Security Leftovers
-
Security updates for Tuesday
Security updates have been issued by Mageia (mysql-connector-java), openSUSE (chromium, curl, libqt4, and singularity), Red Hat (bash and kernel), SUSE (python-pip and python3), and Ubuntu (busybox, ceph, freeimage, libofx, libpam-tacplus, linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp, linux-gcp-4.15, linux-gke-4.15, linux-hwe, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon, linux, linux-azure, linux-gcp, linux-oracle, novnc, and tnef).
-
Microsoft secures backend server that leaked Bing data [Ed: "No personal user data was leaked in the incident," says ZDNet about a Microsoft security incident, just because the liars from Microsoft said so. Did ZDNet check to verify? No. Reprinting lies.]
Microsoft has suffered a rare cyber-security lapse earlier this month when the company's IT staff accidentally left one of Bing's backend servers exposed online.
-
No security audit done on Chinese smartphones- IT ministry
Ministry of Electronics and Information Technology, Government of India, today clarified that it has not conducted any sort of study to check if Chinese-made smartphones used in India are sending sensitive data to their country of origin.
“Ministry of Electronics and Information Technology (MeitY) has not conducted any such study,” said Minister of State Sanjay Dhotre, in response to a question by Rajya Sabha MP Vivek Tankha.
[...]
While the Gnu Public License, which governs the Linux Operating System, requires anyone who makes changes to the code to disclose the changes publicly, such a requirement is not there for BSD, and therefore, for Android.
Unlike GPL, the BSD license allows any company to take the code, alter it in any way they want, and not disclose the changes to anyone.
-
No, Moving Your SSH Port Isn’t Security by Obscurity
In short, you just made it harder for the enemy to successfully attack you by giving them a resource problem. Sure, they can check under every rock in Central Park and eventually find the package, but you’ll be done with the mission by then.
Obscurity doesn’t apply if people know the mechanism you’re using and they simply have a resource problem. Having a known defense but a hidden key is a well-established part of good security, and it has been for millennia.
- Login or register to post comments
- Printer-friendly version
- 2915 reads
- PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
digiKam 7.7.0 is releasedAfter three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. |
Dilution and Misuse of the "Linux" Brand
|
Samsung, Red Hat to Work on Linux Drivers for Future TechThe metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. |
today's howtos
|
Recent comments
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago