Language Selection

English French German Italian Portuguese Spanish

Tor, Proprietary Software, DRM, and Security

Filed under
Security
  • New Release: Tor Browser 10.0a9 (Android Only)

    Android Tor Browser 10.0a9 is now available from the Tor Browser Alpha download page and also from our distribution directory.

    Note: This is an alpha release, an experimental version for users who want to help us test new features. For everyone else, we recommend downloading the latest stable release instead.

  • What Is Google Widevine DRM and Why Do You Need It?

    If you’re streaming content from services like Netflix and Hulu, you may have seen a prompt to install Google Widevine. Depending on your device and browser, it may already be built in by default. Either way, many users want to know exactly what it is and what it does. The good news is it isn’t a virus and it’s safe. It’s also required to view certain streaming content.

  • Nitro PDF maker hit by breach it says is 'isolated', sec firm claims otherwise

    A software firm that had its origins in Melbourne has suffered a data breach that it has described in a notice to the ASX as "an isolated security incident" but which cyber security provider Cyble has claimed is a massive leak that affects companies like Google, Microsoft, Apple, Chase and Citibank.

  • Biden Campaign App '[Crack]' Shows Him Wearing MAGA Hat, Telling People to Vote Trump

    According to a video demonstration published today by experts from Norwegian mobile security company Promon, the software is open to attack via a bug called StrandHogg, which can be abused by malicious hackers to put fake overlay screens over apps and steal sensitive information, including usernames and passwords.

    In a test showing how such an attack could appear in the real world, the team was able to exploit the bug and insert a picture overlay on the Biden campaign app.

  • ENTERPRISES SHOULD FIX THESE 25 FLAWS [Ed: NSA fails to mentions Microsoft Windows as a whole (because it has "good" back doors in it)]

    The United States National Security Agency identified 25 vulnerabilities in software that are most commonly targeted by state-sponsored attackers from China. Setting aside the question of whether or not the enterprise is more likely to be targeted by nation-state attackers or cyber-criminals, the list provides enterprise IT staff with a good starting place on which vulnerabilities to prioritize.

    The vulnerabilities on NSA’s list can be used to gain initial access to enterprise networks by targeting systems directly accessible from the Internet. Seven of the flaws are in remote access gateways, three are found in networking equipment, and three impact public-facing servers. Once in the network, the attacker can use other vulnerabilities to find other systems to compromise and carry out their activities. Seven flaws on the list involve internal servers, two affect Active Directory, and one exists in mobile device management.

More in Tux Machines

Today in Techrights

Android Leftovers

Top 7 Linux GPU Monitoring and Diagnostic Commands Line Tools

A video card is a special circuit board that controls what is displayed on a computer monitor. It is also called a graphics processing unit (GPU), which calculates 3D images and graphics for Linux gaming and other usages. Let us see the top 7 Linux GPU monitoring and diagnostic command-line tools to solve issues. The following tools work on Linux for GPU monitoring and diagnostic purposes and other operating systems such as FreeBSD. The majority of Linux and FreeBSD users these days use Nvidia, Intel, and AMD GPUs. Read more

Ubuntu Linux maker Canonical publishes curated container images to help secure software supply chains

A good deal of software development now relies on open source images, but it can be hard for businesses to know if they're introducing security flaws by using them. Canonical -- the company behind Ubuntu Linux -- is addressing this by publishing the LTS (Long Term Support) Docker Image Portfolio, a curated set of secure container application images, on Docker Hub. LTS Images are built on trusted infrastructure, in a secure environment, with guarantees of stable security updates. Canonical and Docker will collaborate on Docker Official Images and the LTS Docker Image Portfolio to bring the best of the two to the community and ecosystem. The entire LTS Docker Image Portfolio will also be exempted from per-user rate limits. Read more