- Latest Headlines
- Recent comments
- All-Time Popular Stories
- Hot Topics
- Latest Members
|Story||NetworkManager 1.0.6 brings metered connections API and more||Rianne Schestowitz||28/08/2015 - 8:05pm|
|Story||Wayland in Fedora 23 Linux Allows for Use of Multiple Monitors with Different DPIs||Rianne Schestowitz||28/08/2015 - 7:17pm|
|Story||GNOME Developers Discuss Codenames, GNOME 3.18 Might be Dubbed "Gothenburg"||Rianne Schestowitz||28/08/2015 - 7:13pm|
|Story||Developer lowers Drupal's barrier to entry||Rianne Schestowitz||28/08/2015 - 7:10pm|
|Story||Intel invests $60 million in drone venture||Rianne Schestowitz||28/08/2015 - 7:00pm|
|Story||Today in Techrights||Roy Schestowitz||2||28/08/2015 - 6:41pm|
|Story||today's howtos||Rianne Schestowitz||28/08/2015 - 6:34pm|
|Story||Security Leftovers||Rianne Schestowitz||28/08/2015 - 6:33pm|
|Story||Firefox 40.0.3 Arrives in All Ubuntu OSes||Rianne Schestowitz||28/08/2015 - 5:27pm|
|Story||Migrate from Proprietary Software to Linux to Create Cost Savings||Rianne Schestowitz||28/08/2015 - 5:19pm|
Lubomir Rintel informs users about the release and immediate availability for download of the sixth maintenance version of the open-source NetworkManager network connection management utility for GNU/Linux operating systems.
From a consumer perspective, I'd like open source to be ubiquitous to the point of invisibility. Using recent Ubuntu distros, I'm always shocked at how professional the environment feels. Just five years ago, you'd need to hunt down drivers and do a bunch of fiddling to get basic things like a sound card working. Now there are so many pushbutton ways to deploy open source tech, from OSes to CMS distros on Pantheon to buying an Android-powered mobile phone.
We're not quite to the point where CMS users can feel like open source is transparent; there's still a huge investment in vendors to give you the expertise to manage your Drupal or WordPress site, for example. But we're closer than we were a decade ago, and that's pretty exciting.
Intel is investing $60 million in UAV firm Yuneec, whose prosumer “Typhoon” drones use Android-based controllers.
Intel Corp. CEO Brian Krzanich and Yuneec International CEO Tian Yu took to YouTube to announce an Intel investment of more than $60 million in the Hong Kong based company to help develop drone technology. No more details were provided except for Krzanich’s claim that “We’ve got drones on our road map that are going to truly change the world and revolutionize the industry.” One possibility is that Intel plans to equip the drones with its RealSense 3D cameras (see farther below).
This report describes an elaborate phishing campaign against targets in Iran’s diaspora, and at least one Western activist. The ongoing attacks attempt to circumvent the extra protections conferred by two-factor authentication in Gmail, and rely heavily on phone-call based phishing and “real time” login attempts by the attackers. Most of the attacks begin with a phone call from a UK phone number, with attackers speaking in either English or Farsi.
The attacks point to extensive knowledge of the targets’ activities, and share infrastructure and tactics with campaigns previously linked to Iranian threat actors. We have documented a growing number of these attacks, and have received reports that we cannot confirm of targets and victims of highly similar attacks, including in Iran. The report includes extra detail to help potential targets recognize similar attacks. The report closes with some security suggestions, highlighting the importance of two-factor authentication.
FireEye mobile researchers discovered a security vulnerability that allowed an iOS application to continue to run, for an unlimited amount of time, even if the application was terminated by the user and not visible in the task switcher. This flaw allowed any iOS application to bypass Apple background restrictions. We call this vulnerability Ins0mnia.
It's easy to laugh-and-point at Samsung over its latest smart-thing disaster: after all, it should have already learned its lesson from the Smart TV debacle, right?
Except, of course, that wherever you see “Smart Home”, “Internet of Things”, “cloud” and “connected” in the same press release, there's a security debacle coming. It might be Nest, WeMo, security systems, or home gateways – but it's all the same.
PayPal has patched a security vulnerability which could have been used by hackers to steal users' login details, as well as to access unencrypted credit card information. A cross site scripting bug was discovered by Egyptian 'vulnerabilities hunter' Ebrahim Hegazy -- ironically on PayPal's Secure Payments subdomain.
Grsecurity has existed for over 14 years now. During this time it has been the premier solution for hardening Linux against security exploits and served as a role model for many mainstream commercial applications elsewhere. All modern OSes took our lead and implemented to varying degrees a number of security defenses we pioneered; some have even been burned into silicon in newer processors. Over the past decade, these defenses (a small portion of those we've created and have yet to release) have single-handedly caused the greatest increase in security for users worldwide.
Finland confirmed on Thursday it has detained a Russian citizen, Maxim Senakh, at the request of U.S. federal authorities on computer fraud charges, in a move that Russia calls illegal.
Finnish authorities have confirmed the detention of Maxim Senakh, a Russian citizen accused of committing malware crimes in the US. The Russian Foreign Ministry has expressed concern and called on Finland to respect international law.
Eighty-one percent of healthcare executives say their organizations have been compromised by at least one malware, botnet or other kind of cyberattack during the past two years, according to a survey by KPMG.
The KPMG report also states that only half of those executives feel that they are adequately prepared to prevent future attacks. The attacks place sensitive patient data at risk of exposure, KPMG said.
The 2015 KPMG Healthcare Cybersecurity Survey polled 223 CIOs, CTOs, chief security officers and chief compliance officers at healthcare providers and health plans.
The top election official in Kansas has asked a Sedgwick County judge to block the release of voting machine tapes sought by a Wichita mathematician who is researching statistical anomalies favoring Republicans in counts coming from large precincts in the November 2014 general election.
Amongst the top IT trends of the moment is the development of Linux Containers. Financial and technical investors, Linuxsoftware programmers and customers believe that Linux Containers will transform the way organisations manage their Linux environments from deployment to maintenance. A recent survey by Red Hat and Techvalidate says that 56% of the respondents plan to use Linux containers as vehicles for rolling out web and eCommerce over the next two years. The respondents included a number of Fortune 500 companies and public sector organisations. Any development in the world of e-Commerce is definitely worth taking a look.
Among the benefits of OSS is that it is hardly ever a standalone product. Most OSS is built on other open-source projects. Because of the way it is licensed, these enhancements are then passed back to the open-source community, so the software constantly evolves.
So, if such open-source technology is readily available, and has proved its scalability in webscale businesses, why reinvent the wheel?
Open source is certainly more accepted in the enterprise, said Tony Lock, distinguished analyst at Freeform Dynamics. “It is suitable for all businesses, not just for webscale businesses.”
We would like to inform you about the following:
* GNOME 3.17.91 beta tarballs due
* String Freeze
Tarballs are due on 2015-08-31 before 23:59 UTC for the GNOME 3.17.91
beta release, which will be delivered on Wednesday. Modules which were
proposed for inclusion should try to follow the unstable schedule so
everyone can test them. Please make sure that your tarballs will be
uploaded before Monday 23:59 UTC: tarballs uploaded later than that
will probably be too late to get in 3.17.91. If you are not able to
make a tarball before this deadline or if you think you'll be late,
please send a mail to the release team and we'll find someone to roll
the tarball for you!
As part of the release of Ubuntu 15.10 (Wily Werewolf) Beta 1 for opt-in flavors, the Ubuntu Kylin team had the pleasure of announcing the immediate availability for download and testing of the first Beta build of the upcoming Ubuntu Kylin 15.10 distro.
Also: Kubuntu Wily Beta 1
I use two desktop operating systems regularly -- Windows 10 and Ubuntu. The former is on my main PC, while the latter came pre-installed on a laptop. I’ve always liked Ubuntu, but never enough to make it my primary OS. Because I spend my days writing about Windows it’s kind of a no brainer that I should immerse myself in Microsoft’s operating system.
Canonical, through Martin Wimpress, announced just a few minutes ago the immediate availability for download and testing of the first Beta builds for opt-in flavors of the forthcoming Ubuntu 15.10 (Wily Werewolf) operating system.
Although it isn’t official, Ubuntu Core–the tiny Internet of Things version of Ubuntu–now runs on the Raspberry Pi 2. There are prebuilt binaries as well as instructions for how to roll your own, if you prefer. You can even access GPIO
The makers of Mycroft, a device based on Raspberry Pi 2 that is governed by an AI and is capable of making your house a smart one, have just announced that they plan to release the voice recognition software to help users control their desktops.
We wrote numerous articles related to the GPS Navigation app available for Canonical's Ubuntu Touch mobile operating system, but the next release promises to bring even more features, as well as a major facelift.
Indeed, Microsoft's marketing team published a press release recently saying Office 365 is about 80% cheaper compared to the open source office suite, OpenOffice - with the figures stemming from reports in Italy and the City Council of Pesaro. The Redmond giant claims that to roll out Open Office, Pesaro incurred a one off cost of about €300,000 and had lots of problems with document formatting.
But equally how would you convince a public sector organisation to migrate to your cloud services instead of using 'expensive' open source software?
The obvious way would be to present a case study from a similar organisation together with a well written report commissioned to an "independent" consultancy firm. At this point your future customer has all the data and justifications required to sign on the dotted line.
And some journalists are now presenting this case as fact of Microsoft Office 365 being 80% more economical than open source alternatives.
I would argue that this is an isolated case and the PR efforts by big technology vendors, like many other methods, are being used to trick private and public organisations into signing contracts based on data or claims that may be not completely true.