Language Selection

English French German Italian Portuguese Spanish

Security Leftovers

Filed under
Security
  • Some HTTPS inspection tools might weaken security [iophk: "the death of web-mail UI"]

    In a typical enterprise environment, an HTTPS connection can even be intercepted and re-encrypted multiple times: at the network perimeter by gateway security products or data leak prevention systems and on endpoint systems by antivirus programs that need to inspect such traffic for malware.

    The problem is that users' browsers no longer get to validate the real server certificates because that task falls to the interception proxy. And as it turns out, security products are pretty bad at validating server certificates.

  • Defence against the Dark Arts involves controlling your hardware

    In light of the Vault 7 documents leak (and the rise to power of Lord Voldemort this year), it might make sense to rethink just how paranoid we need to be.

  • This laptop-bricking USB stick just got even more dangerous

    Remember that USB stick that would destroy almost anything in its path, from laptops, photo booths, kiosks, to even cars?

    Now there's a new version, and it's even more dangerous than before.

    In case you missed it the first time around, a Hong Kong-based company built a weaponized pocket-sized USB stick, which when plugged into a device, will rapidly charge its capacitors from the USB power supply and then discharge, frying the affected device's circuits.

  • Docker Image Vulnerability Research

    Managing known vulnerabilities is the first step towards a strong security posture. If we’re not updating our systems, and keeping an eye on emerging vulnerabilities that are yet to be patched upstream, we’re basically leaving the front door wide open.

More in Tux Machines

Development News

Security Leftovers

  • How To Improve The Linux System’s Security Using Firejail
    As you already know, Linux kernel is secure by default. But, it doesn’t mean that the softwares on the Linux system are completely secure. Say for example, there is a possibility that any add-ons on your web browser may cause some serious security issues. While doing financial transactions over internet, some key logger may be active in browser which you are not aware of. Even though, we can’t completely give the bullet-proof security to our Linux box, we still can add an extra pinch of security using an application called Firejail. It is a security utility which can sandbox any such application and let it to run in a controlled environment. To put this simply, Firejail is a SUID (Set owner User ID up on execution) program that reduces the risk of security breaches by restricting the running environment of untrusted applications.
  • “Httpd and Relayd Mastery” off to copyedit
  • Kalyna Block Cipher

Containers vs. Zones vs. Jails vs. VMs

  • Setting the Record Straight: containers vs. Zones vs. Jails vs. VMs
    I’m tired of having the same conversation over and over again with people so I figured I would put it into a blog post. Many people ask me if I have tried or what I think of Solaris Zones / BSD Jails. The answer is simply: I have tried them and I definitely like them. The conversation then heads towards them telling me how Zones and Jails are far superior to containers and that I should basically just give up with Linux containers and use VMs. Which to be honest is a bit forward to someone who has spent a large portion of her career working with containers and trying to make containers more secure. Here is what I tell them:
  • [Old] Hadoop Has Failed Us, Tech Experts Say

    The Hadoop community has so far failed to account for the poor performance and high complexity of Hadoop, Johnson says. “The Hadoop ecosystem is still basically in the hands of a small number of experts,” he says. “If you have that power and you’ve learned know how to use these tools and you’re programmer, then this thing is super powerful. But there aren’t a lot of those people. I’ve read all these things how we need another million data scientists in the world, which I think means our tools aren’t very good.”

Wine and Games

  • [Wine] Packaging changes
    Today we want to announce some important changes regarding the Wine Staging packages provided at repos.wine-staging.com and dl.winehq.org. We completely reworked our build system to make the packages available sooner after a release and also added some new features, like downloading old packages for Debian / Ubuntu. The complete list of changes can be found in the announcement email on the Wine mailing list.
  • Planescape: Torment Enhanced Edition Announced for PC, Mac, Linux, and Mobile
  • Podcast #6 with Ethan Lee, Porter on Fez, Transistor
    Have you ever played Fez on Linux ? Transistor ? Speed Runners ? Shenzen I/O ? Bastion ? or more recently, Owlboy ? Well if you have, you have benefited from the work of Flibitijibibo who is directly responsible for the port of such titles to your platform.