Security Leftovers

-
A masterclass in responding to vulnerability disclosure: The Buddi app and tracker | Pen Test Partners
The Buddi tracker https://www.buddi.co.uk/ is used for tracking elderly and vulnerable people. It’s a GPS/GSM-based clip-on device that reports wearer position to an app via a platform. It means that the wearer can easily be found by their carer or the emergency services, should they become lost and unable to make their own way home. The device also features a panic button that automatically calls their carer and allows the wearer to speak to them.
The device is popular in the care market, allowing the wearer a greater degree of independence and the ability to live independently for longer. The business behind Buddi has recently listed successfully on the UK AIM stock market (AIM:BIG), reflecting significant growth in the tracking markets in both UK and US.
-
Security updates for Monday
Security updates have been issued by Debian (bluez, icu, libntlm, libvorbis, libvpx, opensc, roundcube, and tar), Fedora (kernel, kernel-headers, kernel-tools, puppet, slurm, stargz-snapshotter, and suricata), openSUSE (netcdf), Oracle (bluez, kernel, kernel-container, krb5, mailman:2.1, openssh, python3, and rpm), Red Hat (samba), and SUSE (xen).
-
Cyber Security Today, Nov. 29, 2021 – Ikea under phishing attack, evasive JavaScript loader discovered and malware found hiding in Linux calendars [Ed: Linux is a kernel, it does not do "calendars"]
Ikea under phishing attack, evasive JavaScript loader discovered and malware found hiding in Linux calendars.
-
Awesome Linux Tools: Lynis from CISOfy - Invidious
In this episode of Awesome Linux Tools, the spotlight is on Lynis - a really awesome utility you can use to get a better understanding of the overall security hygiene of your server. In this video, Jay will show you how to install it, and also how to run an audit.
-
CronRat Magecart malware uses 31st February date to remain undetected | IT PRO
Security researchers have discovered a Linux-based remote access trojan (RAT) that uses an unusual stealth technique to remain out of sight from security products.
The malware, dubbed CronRat, hides in the calendar subsystem of Linux servers (“cron”) on a non-existent day, 31 February, according to a blog post by security researchers at Sansec.
-
- Login or register to post comments
Printer-friendly version
- 3383 reads
PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
Android Leftovers | Programming Leftovers
|
8 Best Free and Open Source Survey Tools
Surveys are one of the most effective tools for obtaining customer feedback. However, creating and distributing them can be very challenging.
Without the right software, you can spend days, even weeks, trying to create a perfect survey. And even then the quality and formatting of the survey may fall short of industry standards.
You may therefore need a survey creation tool that can help set up an effective feedback loop. The software featured here lets you build fully-customizable surveys, forms and quizzes.
Here’s our verdict captured in a legendary LinuxLinks chart. Only free and open source software is included. Each application can be self-hosted on your own server.
| Open Source developments in Bratislava
The City of Bratislava is currently building a whole new ecosystem of open source digital services under the leadership of its CIO Petra Dzurovčinová. These services will be tested in Bratislava and then ate planned to be expanded to other cities in Slovakia with a goal of limiting the existing vendor lock-in and improving public services for the residents. According to Petra, choosing open source solutions for the digital transformation of the city is based not only on the long-term economic incentive, but more importantly, on the quality of services to be provided for the citizens. The digitisation team in Bratislava took on the task by first identifying and understanding the needs of the citizens through iterative processes involving interviews, co-creation and cooperating with other cities. A large part of the work has been done internally in the conceptualisation phase to steer the next steps of developing technological solutions and ensure achieving the planned objectives. ![]() |
Samsung Bricks Smart TVs
Samsung Bricks Smart TVs
How cybercriminals exploit WordPress to distribute malware
The other victims of FluBot: How cybercriminals exploit WordPress to distribute malware