Language Selection

English French German Italian Portuguese Spanish

Security

Snowden: New Zealand Is Spying, Too

Filed under
Security

Former National Security Agency contractor Edward Snowden warned New Zealanders in a media blitz on Monday that all of their private emails, phone calls and text messages are being spied on despite government denials.

"If you live in New Zealand, you are being watched," Snowden said in a commentary published by the Intercept, an online news site co-founded by Guardian columnist Glenn Greenwald, Snowden's main conduit for disclosing classified information he absconded with when he fled his NSA job last year.

Read more

CipherShed: A replacement for TrueCrypt

Filed under
OSS
Security

While the Open Crypt Audit Project, headed by cryptographer Matthew Green and Kenneth White, Principal Scientist at Social & Scientific Systems, has been considering whether to take over the development of TrueCrypt and is working on the second phase of the audit process (a thorough analysis of the code responsable for the actual encryption process), one of TrueCrypt's developers has expressed his disapproval of a project that would fork the software.

Read more

Open source is not dead

Filed under
Red Hat
Interviews
OSS
Security

I don’t think you can compare Red Hat to other Linux distributions because we are not a distribution company. We have a business model on Enterprise Linux. But I would compare the other distributions to Fedora because it’s a community-driven distribution. The commercially-driven distribution for Red Hat which is Enterprise Linux has paid staff behind it and unlike Microsoft we have a Security Response Team. So for example, even if we have the smallest security issue, we have a guaranteed resolution pattern which nobody else can give because everybody has volunteers, which is fine. I am not saying that the volunteers are not good people, they are often the best people in the industry but they have no hard commitments to fixing certain things within certain timeframes. They will fix it when they can. Most of those people are committed and will immediately get onto it. But as a company that uses open source you have no guarantee about the resolution time. So in terms of this, it is much better using Red Hat in that sense. It’s really what our business model is designed around; to give securities and certainties to the customers who want to use open source.

Read more

Google is making encryption standard in the next version of Android

Filed under
Android
Security

Less than a day after Apple detailed new efforts in user privacy for its products, Google now says it plans to encrypt user data on all Android devices. Speaking to The Washington Post, Google says data encryption will now be a part of the activation process instead of an optional feature. The end result is that whatever data is stored on that device, be it a phone or tablet, will be inaccessible unless the person has the correct password.

Read more

Qubes: The Open Source OS Built for Security

Filed under
Linux
Interviews
Security

No matter how good the code review process is, or how high the standards for acceptance, applications will always have bugs, says Joanna Rutkowska, founder and CEO of Invisible Things Lab. So will drivers. And filesystems.

“Nobody, not even Google Security Team, can find and patch all those bugs in all the desktop apps we all use,” Rutkowska says in the Q&A interview, below.

Read more

Open-source project promises easy-to-use encryption for email, instant messaging and more

Filed under
OSS
Security

Called "Pretty Easy Privacy" (PEP), the project's goal is to integrate the technology with existing communication tools on different desktop and mobile platforms. The development team launched a preview PEP implementation Monday for the Microsoft Outlook email client, but plans to build similar products to encrypt communications in Android, iOS, Firefox OS, Thunderbird, Apple Mail, Jabber, IRC (Internet Relay Chat), WhatsApp, Facebook Messenger, Snapchat and Twitter.

Read more

Free Linux Firewall OS IPFire 2.15 Core 82 Has Windows Active-Directory Single Sign-On Web Proxy

Filed under
Android
GNU
Security

Michael Tremer, a developer for the ipfire.org team, has announced that IPFire 2.13 Core 82, a new stable build of the popular Linux-based firewall distribution, is available, bringing quite a few security fixes.

IPFire releases are not usually very big, but this latest update in the series is quite substantial. A number of features and changes have been made and the devs are working to bring even more options to the masses.

Read more

Kolab creates a privacy refugee camp in Switzerland

Filed under
KDE
Security
Web

The disclosure by NSA contractor Edward Snowden has exposed the ‘out-of-control’ surveillance system of the US and the UK. The more stories we are getting from Guardian and NYTimes, the more people are losing trust in the proprietary solutions offered by the companies which operate from the US and seemingly work closely with the spy agencies.

This is a category of people who don’t yet understand the dangers of breach of privacy, but the more we are moving our lives into the digital world, the more important it is becoming to take control of our communication and privacy from the prying hands of those for whom we are the product.

Then there are those need this privacy, due to the profession they are in or for purely sensible reasons that our privacy should be respected.

Read more

Free Software Foundation statement on the new iPhone, Apple Pay, and Apple Watch

Filed under
Security

The Free Software Foundation encourages users to avoid all Apple products, in the interest of their own freedom and the freedom of those around them.

Read more

Why open source and collaboration are the future of security

Filed under
OSS
Security

In this podcast recorded at Black Hat USA 2014, Greg Martin, CTO at ThreatStream, talks about why open source and collaboration are the key drivers of information security innovation. He raises an important question - what will happen if we don't start actively sharing information?

Read more

Syndicate content

More in Tux Machines

ExTiX 15.2 Is Based on Ubuntu 15.04 and Debian 8 Jessie, Features LXQt and KDE Editions

After announcing his new RaspArch distribution that helps users run the powerful Arch Linux distribution on a Raspberry Pi 2 Model B computer board, Arne Exton informed Softpedia about the immediate availability for download of the ExTiX 15.2 Linux operating system. Read more

RaspArch Offers an Easy Way to Run Arch Linux on Raspberry Pi 2

Arne Exton had the pleasure of informing Softpedia about a new distribution of GNU/Linux created from the ground up for the Raspberry Pi 2 tiny computer board and called RaspArch. Read more

Leftovers: Software

  • goobook: Command-line contacts
  • Calibre eBook Editor Gets Much Better Support for DOCX
    Calibre, a complete application to edit, view, and convert eBook files, has been updated yet again, and the developer has added a number of new features and various other fixes.
  • GNOME Builder - 3.16.2
    I released 3.16.0 a couple weeks ago without much fanfare. Despite many months of 16-hour days and weekends, it lacked some of the features I wanted to get into the "initial" release. So I didn't stop. I kept pushing through to make 3.16.2 the best that I could.
  • PacketFence v5.0 released
    The Inverse team is pleased to announce the immediate availability of PacketFence 5.0.0. This is a major release with new features, enhancements and important bug fixes. This release is considered ready for production use and upgrading from previous versions is strongly advised.
  • What are good open-source log monitoring tools on Linux
    In an operating system, logs are all about keeping track of events, be it critical system errors, resource usage warnings, transaction history, application status, or user activities. These logs, which are stored as (text or binary) files in the system, are useful for system auditing, debugging and maintenance. However, with so many different system entities generating log files, and even at growing rate, the challenge as a system admin is to how to "consume" these log files effectively.
  • Apache Fortress Core 1.0-RC40 released !
  • Say Hello to Open Source Puppet 4!
    Production-ready Open Source Puppet 4 is now available! We’re excited to announce new features and enhancements that will extend your use of Puppet for faster, more consistent management of server configurations. We’ve added capabilities to help you save time, reduce errors, and increase reliability.
  • textprint: Visually impressive, in only 18K
    textprint takes a flat data file as input, and arranges it graphically to fit the terminal without distorting the image. From there, textprint goes from zero-to-60, in about two seconds.