Language Selection

English French German Italian Portuguese Spanish

Security

Security Leftovers

Filed under
Security

Security Leftovers

Filed under
Security
  • Java vulnerability caused by unpatched open source library
  • How long will Flash survive?

    A few years ago, it was difficult to browse the web without coming across a site using Flash.

    Released in 1996, the browser plug-in enabled animations, interactivity and streaming video on what was a largely static web.

    But the software has been plagued by security problems, and has been criticised for affecting computer performance and battery life.

    Now many experts say the media plug-in's days are numbered. Watch the video to find out more.

  • Continuous integration tools can be the Achilles heel for a company's IT security

    Some of the most popular continuous integration tools used by software development teams have not been designed with security in mind and can open a door for attackers to compromise enterprise networks.

    Some of the most popular automated software building and testing tools used by developers have not been designed with security in mind and can open the door for attackers to compromise enterprise networks.

  • Linux Ransomware Infects 2,000+ Websites

    Linux.Encoder.1 is targeting websites deployed on servers running Linux and created on various content management systems, including WordPress and Magento.

Numerous Kerberos Vulnerabilities Have Been Fixed in All Ubuntu OSes

Filed under
Security
Ubuntu

Canonical published details in a security notice about a number of Kerberos vulnerabilities that have been found and fixed in Ubuntu 15.10, Ubuntu 15.04, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS operating systems.

Read more

Firefox's New Feature for Tighter Security

Filed under
Security

Freedom and privacy go hand in hand. In an ideal world, we wouldn't have to worry about who was looking over our shoulders. None of us would have anything to hide, and we would have ulterior motives. As citizens of the real world though, we have to take measures to protect ourselves.

Building privacy features into the software we use makes that protection easier to accomplish. And, that's why Mozilla has extended Firefox's private browsing feature with a new option to prevent third-party sites from tracking your on-line activity.

Read more

Security Leftovers

Filed under
Security
  • The Lingering Mess from Default Insecurity

    These vulnerable devices tend to coalesce in distinct geographical pools with deeper pools in countries with more ISPs that shipped them direct to customers without modification. SEC Consult said it found heavy concentrations of the exposed Ubiquiti devices in Brazil (480,000), Thailand (170,000) and the United States (77,000).

    SEC Consult cautions that the actual number of vulnerable Ubiquiti systems may be closer to 1.1 million. Turns out, the devices ship with a cryptographic certificate embedded in the router’s built-in software (or “firmware”) that further weakens security on the devices and makes them trivial to discover on the open Internet. Indeed, the Censys Project, a scan-driven Internet search engine that allows anyone to quickly find hosts that use that certificate, shows exactly where each exposed router resides online.

  • Public Beta: December 3, 2015

    Let’s Encrypt will enter Public Beta on December 3, 2015. Once we’ve entered Public Beta our systems will be open to anyone who would like to request a certificate. There will no longer be a requirement to sign up and wait for an invitation.

    Our Limited Beta started on September 12, 2015. We’ve issued over 11,000 certificates since then, and this operational experience has given us confidence that our systems are ready for an open Public Beta.

  • ​Linux ransomware rising? Linux.Encoder.1 now infects thousands of websites [Ed: Tung hypes up already-patched Magento bug]

    The security firm said the ransomware was infecting Linux web servers by exploiting unpatched instances of the widely-used Magento CMS.

Is Linux Free From Viruses And Malware?

Filed under
Linux
Security

Linux is very secure in its architecture that you even won’t need to go behind any kind of firewalls until you’re on a Network. The access control Security Policy in Linux which is called SELinux (Security-Enhanced Linux) is a set of user-space tools and Kernel modification that implement the security policies in Linux operating system. Even this Security-Enhanced Linux isn’t must for normal users, however, it’s very important for users who are on Network and/or Administrators.

Read more

Linux Security - How Can Your Linux Be Hacked Using Malware, Trojans, Worms, Web Scripts Etc.

Filed under
Linux
Security
HowTos


Is Linux Virus free?

Is it possible that Linux can be infected with viruses? Probably, you heard of this in some debates. But here are some facts that you need to know to better understand how Linux is secured and what things can damage a Linux system. See how it is possible that Linux can be too infected and what are the percentages that you're currently with an infected Linux running on your computer.

Read At LinuxAndUbuntu

Security Leftovers

Filed under
Security

Security Leftovers

Filed under
Security

SAP's HANA will lose the big data war without open source, as proven by 21 new security flaws

Filed under
OSS
Security

SAP has been boasting about its "revolutionary" big data platform, SAP HANA, for years. While its claims have always been a bit suspect, recent revelations that HANA is riddled with critical security flaws only reinforce the mantra that, when it comes to big data infrastructure, open source is best.

Read more

Syndicate content

More in Tux Machines

Early Ubuntu 14.04 vs. Ubuntu 16.04 Intel Xeon E5 Benchmarks

This morning I posted some Ubuntu 14.04 vs. 16.04 LTS Radeon graphics benchmarks while if open-source AMD graphics driver evolution doesn't get you excited, in this article are results from other non-graphics benchmarks in comparing the Ubuntu 14.04 vs. 16.04 performance for these long-term support releases in their current form. For getting an idea how the overall Ubuntu Linux performance has evolved over the past two years for those solely riding Long-Term Support releases, I compared the performance of Ubuntu 14.04.0 to Ubuntu 16.04 LTS in its current daily ISO form. The tests were done on the same Intel Xeon E5-2687W v3 (Haswell) system with MSI X99S SLI PLUS motherboard, 16GB of RAM, and AMD FirePro V7900 graphics. Read more Also: ‘Android OEMs Will Ship Ubuntu Phones This Year’, Say Canonical

Top Android apps for your Raspberry Pi

Mostly, our tutorials are about completing a specific project and reaching a particular goal. However, this time we’re doing something a bit different. We are showing you some Android apps that you can use along with your Ras Pi. These apps aren’t tied to particular projects – you can use them whenever and as often as you like – but we think they can add something to your whole experience with the Pi. Read more

These 3 things are trying to kill Linux containers

For nearly two years, Linux containers have dominated the world of enterprise IT, and for good reason — among others, they take on issues that virtualization simply cannot within application development and computing at scale and allow for the enterprise world to truly embrace concepts like devops and microservices (the Service Oriented Architecture dream from years gone by). That sound you hear is IT vendors stampeding towards the container bandwagon, but, as with every emerging tech trend, this isn’t always a good thing, as not everyone is walking the walk, regardless of what the business might actually say. Read more

GNOME and KDE

GNOME
  • GNOME Maps Is Looking Better In GNOME 3.20
    While not yet as versatile as say Google Maps, GNOME Maps for GNOME 3.20. is looking to be a nice upgrade. Maps in GNOME 3.20 is making progress with OpenStreetMap editing, expanded place bubbles, adding new places to OSM, support for printing routes, and more.
  • My Updated 3.18 Packages for GNOME Extensions
    I started releasing extension updates in 2014 due to a lot of extensions being unmaintained and seemingly break every time GNOME releases a new version of the Desktop Environment (DE). This is my third batch release post for GNOME extensions and these extension packages are for GNOME 3.18.
KDE