Language Selection

English French German Italian Portuguese Spanish

Security

Tails 1.8 is out

Filed under
GNU
Linux
Security
Debian

This release fixes numerous security issues. All users must upgrade as soon as possible.

Read more

Security Leftovers

Filed under
Security

Security Leftovers

Filed under
Security
  • The Joy of Getting Hacked

    Two weeks ago, the server I host all my personal projects on was hacked by some guy in Ukraine.

  • Microsoft Edge has inherited many of Internet Explorer's security holes

    We're all anxiously awaiting the day that Windows 10's new Edge browser becomes usable. That hasn't happened yet, but it will some day next year. Microsoft Edge should represent a huge improvement in browser security, particularly when compared with the ancient, creaking, and leaky Internet Explorer. Recent events, though, have me wondering if Edge really represents that big of a step forward.

  • DEF CON 23 - Runa Sandvik, Michael Auger - Hacking a Linux-Powered Rifle

    TrackingPoint is an Austin startup known for making precision-guided firearms. These firearms ship with a tightly integrated system coupling a rifle, an ARM-powered scope running a modified version of Linux, and a linked trigger mechanism. The scope can follow targets, calculate ballistics and drastically increase its user's first shot accuracy. The scope can also record video and audio, as well as stream video to other devices using its own wireless network and mobile applications.

  • Supporting secure DNS in glibc
  • TLS in the kernel

    An RFC patch from Dave Watson at Facebook proposes moving the bulk of Transport Layer Security (TLS) processing into the kernel. There are a number of advantages he sees for doing so, but most of the commenters on the patch set seem a bit skeptical about the idea. TLS is, of course, the encryption layer that protects HTTPS and other internet protocols.

  • Let's Encrypt Stats
  • December ’15 security fixes for Adobe Flash

Security Leftovers

Filed under
Security

EFF Launches Open Source Code Security Program to Improve User Privacy

Filed under
OSS
Security

The Electronic Frontier Foundation (EFF) has launched a new security initiative aimed at identifying vulnerabilities in open source code. The move is another sign of the open source world's increasing interest in leveraging the the community to shore up software security in the wake of embarrassments like Heartbleed, the bug found in the popular OpenSSL cryptographic software library that led to so much trouble last year.

Read more

Dutch government to shore up open source security

Filed under
OSS
Security

The Dutch Parliament on Tuesday approved a EUR 0.5 million budget to develop and improve existing open source encryption solutions that are a crucial part of the Internet. The plan is to enhance projects such as OpenSSL, LibreSSL or PolarSSL (mbed TLS).

Read more

Security Leftovers

Filed under
Security
  • Symantec: iOS and OS X users face a surge of fresh security threats

    SECURITY FIRM Symantec has warned that the hacker threat to Apple users has reached unprecedented levels.

    The firm reckons that Apple is a victim of its success, becoming a bigger target as its user base grows. To be fair to Apple most of the problem relates to jailbroken devices, which is not a thing that the firm recommends. We have seen incidents recently that make the most of this. The threat applies to mobile software and the desktop.

  • DoS attack brings UK universities to a virtual standstill

    According to the Telegraph newspaper, universities across the country have been hit by DoS attacks. This means in some cases no internet access, and that means students will have to study like it's 1980 something.

  • U.K. Cops Are Trying to Scare Teen Hackers With House Calls

    It was a summer morning, officer Paul Hastings recalls, when he arrived at a suspected hacker’s house in the northern English city of Hull. There, police had tracked one of the people who’d signed up online for a hacking service called Lizard Stresser that was used to attack companies including Microsoft, Amazon.com, and Sony at the end of 2014. This particularly fearsome cybervigilante was asleep when Hastings knocked, so his dad answered the door.

    The visit was one of about 50 U.K. police made this year to people they say used the Lizard Stresser site, many of them children. The Hull suspect, a teenager, couldn’t have done anything wrong, his dad told Hastings. He spent all his time upstairs, on his computer.

    [...]

    Teen hackers have been pop culture figures since Matthew Broderick starred in WarGames, and the U.K. has a long history with juvenile black hats. In 1994, when U.S. Air Force researchers found an unauthorized user on their systems downloading data, they tracked the hacker to a North London suburb. Working with London police, they found their culprit: a 16-year-old boy in an attic bedroom, as journalist Gordon Corera recounts in Intercept: The Secret History of Computers and Spies.

Open source encryption? Now Netherlands votes to help fund security projects

Filed under
OSS
Security

In what some might see as swimming against the political mainstream, the Netherlands parliament has just decided to back open-source web security with hard cash.

Read more

Security Leftovers

Filed under
Security

Security Leftovers

Filed under
Security
Syndicate content

More in Tux Machines

Red Hat News

  • Want to work in Release Engineering in Europe?
    Red Hat Release Engineering is hiring in Europe.
  • Red Hat targets midmarket with Keating, Tech Data partnerships
    Red Hat Canada has unveiled a new approach to reach the lower end of the enterprise and the upper midmarket in partnership with Keating Technologies and Tech Data Canada. Under the program, Keating will work with the vendor to uncover and qualify leads in the $500 million to $1.0 billion market. Once fully developed, those leads will be handed over to existing Red Hat Canada partners to close the deal, and will be fulfilled through Tech Data.
  • Gulf Air creates private cloud to support open-source big data engine
    Bahrain’s national carrier is using Red Hat Enterprise Linux, Red Hat JBoss Enterprise Application Platform, and Red Hat Storage as a platform for its Arabic Sentiment Analysis system, which monitors people’s comments through their social media posts.
  • Fedora Pune meetup April 2016
    I actually never even announced the April meetup, but we had in total 13 people showing up for the meet. We moved the meet to my office from our usual space as I wanted to use the white board. At beginning I showed some example code about how to write unittests, and how are we using Python3 unittests in our Fedora Cloud/Atomic images automatically. Anwesha arranged some soft drinks, and snacks for everyone.

Android Leftovers

“LEDE” OpenWrt fork promises greater openness

A “Linux Embedded Development Environment” (LEDE) fork of the lightweight, router-oriented OpenWrt Linux distribution vows greater transparency and inclusiveness. Some core developers of the OpenWrt community has forked off into a Linux Embedded Development Environment (LEDE) group. LEDE is billed as both a “reboot” and “spinoff” of the lightweight, router-focused distribution that aims to build an open source embedded Linux distro that “makes it easy for developers, system administrators or other Linux enthusiasts to build and customize software for embedded devices, especially wireless routers.” Read more

Neptune 4.5.1 ISOs are available now

Neptune 4.5.1 ISOs are available for download now and update the system since the Neptune 4.5 release to the state of 3. May 2016. The biggest issue fixed in this release is the usb booting from USB 3 ports. Besides that this new maintainance release features KDE SC 4.14.16 as desktop. Read more