Language Selection

English French German Italian Portuguese Spanish

News

NSA’s Encryption Algorithm in Linux Kernel is Creating Unease in the Community

Filed under
News

ISO rejected NSA’s weak encryption algorithm, Speck. But Google coded it for Linux Kernel and Linux Kernel 4.17 contains this controversial algorithm. Obviously, not everyone is happy with it.
Read more

The August 2018 Issue of the PLCinuxOS Magazine

Filed under
News

The PCLinuxOS Magazine staff is pleased to announce the release of the August 2018 issue. With the exception of a brief period in 2009, The PCLinuxOS Magazine has been published on a monthly basis since September, 2006. The PCLinuxOS Magazine is a product of the PCLinuxOS community, published by volunteers from the community.

This Week in Techrights

Filed under
News

Lubuntu Doesn’t Want to be the “distribution for old computers” Anymore

Filed under
News

The popular lightweight Linux distribution Lubuntu doen't want to focus specifically on older computers anymore.
Read more

NetBSD Version 8.0 Released With New Features

Filed under
News

NetBSD has a new major release in its 25th year. NetBSD 8.0 release brings several new features and improvements.
Read more

Syndicate content

More in Tux Machines

Get Fresh Wallpaper Everyday Using Variety in Ubuntu/Linux

Variety is a cool utility available for Linux systems which makes your dull desktop look great, every day. This free wallpaper changer utility replaces your wallpaper in your desktop in an interval. You can set it to change wallpaper in every 5 minutes also! Read more

Today in Techrights

Security Leftovers

  • The Internet of Torts

    Rebecca Crootof at Balkinization has two interesting posts:

    • Introducing the Internet of Torts, in which she describes "how IoT devices empower companies at the expense of consumers and how extant law shields industry from liability."
    • Accountability for the Internet of Torts, in which she discusses "how new products liability law and fiduciary duties could be used to rectify this new power imbalance and ensure that IoT companies are held accountable for the harms they foreseeably cause.

    Below the fold, some commentary on both.

  • Password Analyst Says QAnon’s ‘Codes’ Are Consistent With Random Typing

    “The funny thing about people is that even when we type random stuff we tend to have a signature. This guy, for example, likes to have his hand on the ends of each side of the keyboard (e.g., 1,2,3 and 7,8,9) and alternate,” Burnett wrote in his thread.

  • Uber taps former NSA official to head security team

    Olsen, who served as the counterterrorism head under President Obama until 2014, will replace Joe Sullivan as the ride-hailing company's top security official.

    Sullivan was fired by Uber CEO Dara Khosrowshahi over his handling of a massive cyber breach last year that happened during former CEO Travis Kalanick’s tenure.

  • Malware has no trouble hiding and bypassing macOS user warnings

    With the ability to generate synthetic clicks, an attack, for example, could dismiss many of Apple's privacy-related security prompts. On recent versions of macOS, Apple has added a confirmation window that requires users to click an OK button before an installed app can access geolocation, contacts, or calendar information stored on the Mac. Apple engineers added the requirement to act as a secondary safeguard. Even if a machine was infected by malware, the thinking went, the malicious app wouldn’t be able to copy this sensitive data without the owner’s explicit permission.

  • Caesars Palace not-so-Praetorian guards intimidate DEF CON goers with searches [Updated]
  • Amazon Echo turned into snooping device by Chinese hackers [sic]

    Cybersecurity boffins from Chinese firm Tencent's Blade security research team exploited various vulnerabilities they found in the Echo smart speaker to eventually coax it into becoming an eavesdropping device.

Android Leftovers