Security: Updates, FBI, Windows Cameras and More
-
Security updates for Wednesday
-
The FBI wants you to do this one thing to your home router, now
-
FBI wants you to reboot your router: What you need to know
-
Did You Restart Your Router Like the FBI Asked?
-
The FBI is warning you to reboot your router to prevent a new attack — here's everything you need to do
-
Mainstream Media Warns of 'Russian Malware', Ignores CIA's Own Virus Development
The US Federal Bureau of Investigation has warned hackers may have compromised hundreds of thousands of routers and other home network devices the world over with malware. Perhaps predictably, the Russians are said to be behind the ploy - but past experience suggests the true source may lie closer to home.
In an official statement, the FBI said the virus — ‘VPNFilter' — was being used to launch attacks on infrastructure and render electronic devices useless. Anyone possessing a router is strongly urged by the Bureau to reset their device — the malware works in three stages, and rebooting the router prevents the implementation of the latter two stages.
"Owners are advised to consider disabling remote management settings on devices and secure with strong passwords and encryption when enabled. Network devices should be upgraded to the latest available versions of firmware," the Bureau suggested.
-
Securing the container image supply chain
"Security is hard" is a tautology, especially in the fast-moving world of container orchestration. We have previously covered various aspects of Linux container security through, for example, the Clear Containers implementation or the broader question of Kubernetes and security, but those are mostly concerned with container isolation; they do not address the question of trusting a container's contents. What is a container running? Who built it and when? Even assuming we have good programmers and solid isolation layers, propagating that good code around a Kubernetes cluster and making strong assertions on the integrity of that supply chain is far from trivial. The 2018 KubeCon + CloudNativeCon Europe event featured some projects that could eventually solve that problem.
[...]
The question of container trust hardly seems resolved at all; the available solutions are complex and would be difficult to deploy for Kubernetes rookies like me. However, it seems that Kubernetes could make small improvements to improve security and auditability, the first of which is probably setting the image pull policy to a more reasonable default. In his talk, Mouat also said it should be easier to make Kubernetes fetch images only from a trusted registry instead of allowing any arbitrary registry by default.
Beyond that, cluster operators wishing to have better control over their deployments should start looking into setting up Notary with an admission controller, maybe Portieris if they can figure out how to make it play with their own Notary servers. Considering the apparent complexity of Grafeas and in-toto, I would assume that those would probably be reserved only to larger "enterprise" deployments but who knows; Kubernetes may be complex enough as it is that people won't mind adding a service or two in there to improve its security. Keep in mind that complexity is an enemy of security, so operators should be careful when deploying solutions unless they have a good grasp of the trade-offs involved.
-
Victorian speed cameras hit by computer virus
Independent report into WannaCry virus
An unsuspecting contractor was blamed for introducing the virus into Victoria’s speed camera network sometime in early June 2017. The malware was first detected on 6 June 2017 when 20 cameras crashed along the Hume Highway and remained offline overnight.
The infected cameras ran on Windows 7. Another company who used Unix-based cameras still suffered thanks to Windows operating system powered site control units. It wasn’t until 14 June that the true cause of the outages was found and over the next two days, engineers worked on a patch to secure the system. Finally, by 22 June, cameras were fully operational and virus-free again.
-
Secret Commands Let Google Access All Your Android Text Messages
Google is known for hiding easter eggs, and secret features buried deep in its Android OS. However, a weird glitch has appeared on Android which honestly seems more like a bug than an easter egg.
The glitch shows your text messages in search results by using the Google cards assistant feature. It was reported in a Reddit post which says that typing “the1975..com” into the Google search bar will display all your text messages on the screen.
- Login or register to post comments
- Printer-friendly version
- 3804 reads
- PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
digiKam 7.7.0 is releasedAfter three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. |
Dilution and Misuse of the "Linux" Brand
|
Samsung, Red Hat to Work on Linux Drivers for Future TechThe metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. |
today's howtos
|
Recent comments
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago