Language Selection

English French German Italian Portuguese Spanish

Security

New platform offers endpoint protection for Linux servers

Filed under
Linux
Security

Most of the internet is powered by Linux servers, so it's not surprising that they’re increasingly a target for attack. In particular recent attacks have focussed on using compromised systems to distribute malware to other systems.

Many Linux systems rely on traditional signature-based threat detection which leaves them vulnerable to zero-day attacks. Endpoint security company SentinelOne is announcing a new solution aimed at protecting enterprise data centers and cloud providers from emerging threats that target Linux servers.

Read more

More Security Leftovers

Filed under
Security

Tiny Core Linux 7.0 Launches with Patched Linux 4.2.9 Kernel and Glibc Library

Filed under
Linux
Security

The team behind Tiny Core Linux, one of the smallest distributions of GNU/Linux on the market, proudly announced the release of Tiny Core Linux 7.0, which users can now download from the official channels.

Read more

Security Leftovers

Filed under
Security
  • Hackers use Microsoft security tool to pwn Microsoft security tool

    FireEye security wonks Abdulellah Alsaheel and Raghav Pande have twisted the barrels of Microsoft's lauded EMET Windows defence gun 180 degrees and fired.

    The result of their research is p0wnage of the enhanced mitigation toolkit so that instead of defending Windows it attacks it.

    The attacks the pair found affect older versions of Windows which rely on EMET for modern defences like address space layout randomisation and data execution prevention.

  • Is Linux Really as Secure as You Think It Is?

    Security is an important topic on everyone’s minds in today’s highly-technological world. With all of the security news that pops up on almost a daily basis, trying to be aware of the choices you make can make a big difference. Linux is often touted as the most secure operating system you can get your hands onto, but is this reputation deserved?

  • A Fedora Distribution download primer

    With the fresh news of a compromise in the Linux Mint distribution images, I thought I would take a few minutes to explain how Fedora handles image downloads and what you can do as an end user to make sure you have the correct and official Fedora images.

  • Mousejack: Hacking Computers Via Your Mouse With 15 Lines Of Code And Radio Dongle
  • How Criminals Could Hijack Wireless Mice to Hack Computers from Afar

    Wireless computer mice give users the convenience of not having to deal with cumbersome wires and cables. But they might also open up the door for malicious hackers to get a way into their computers, researchers warn.

    A flaw in the way several popular models of wireless mice and their corresponding receivers, the sticks or “dongles” that plug into a USB port and transmit data between the mouse and the computer, handle encryption could leave “billions” of computers vulnerable to hackers, security firm Bastille warned on Tuesday.

  • Child tracking firm calls out security researcher on 'hack'

    A CHILD MONITORING COMPANY is mad as heck at a security researcher for highlighting a security problem without asking its consent first. Or something.

    The company in question is uKnowkids and its target is a chap called Chris Vickery, a security researcher. His crime? Security research.

    uKnowKids.com is a kind of virtual Mary Poppins. It does not put children in danger, like Mary Poppins, but it does look out for them and keep an eye on what they do by monitoring their communications and stuff.

    We imagine that in some circumstance it has got some children in trouble. This week it is getting an older person in trouble, and accusing a security researcher of hacking as opposed to security researching.

  • URL shortening – are these services now too big a security risk to use?

    Spammers and malware pushers are still heavily abusing URL shortening services, messaging security firm Cloudmark has reported in its 2015 annual security report (reg required). The popular Bit.ly service has recently become a particular favourite with criminals with 25,000 individual malicious links run though that service every single day in recent times. This sounds alarming but it gets worse. According to the firm, this meant that an extraordinary 97 percent of Bit.ly links now led to malicious websites.

KDE Partition Manager 2.0.1

Filed under
KDE
Security

I’m happy to announce new bugfix versions of KDE Partition Manager 2.0.1 and KPMcore 2.0.1.

Btrfs used space detection should work without crashing (it was actually cause by crash in btrfs-debug-tree program btrfs filesystem show is used).
Improved support for FAT12 partitions. They were not recognized before. For now they are reported as FAT16 (gparted behaves in the same way).
Installation path for libparted plugins is not force to be in system prefix anymore. This is consistent with how other KDE Applications work, but cmake might require KDE_INSTALL_USE_QT_SYS_PATHS to be set if you are installing kpmcore to /usr.
We know try to find KF5 version of kdesu in libexec even when kdesu is not in $PATH.
Fixed visible HTML in one dialog box (#354925).

There is still an open issue that Partition Manager reports itself as 2.0.0 instead of 2.0.1. I tried to bump the version but there seem to be some kind of bug that prevents KDE Partition Manager and Calamares to compile or work. We will continue to investigate this issue but 2.0.1 should work well despite incorrectly reporting it’s own version

Read more

Subgraph OS Wants to Make Using a Secure Operating System Less of a Headache

Filed under
GNU
Linux
Reviews
Security

While tools for message encryption have become easier to use in recent years, one gaping hole remains in many people's infosec: the security of the device they use (their “end-point”). A new secure operating system called Subgraph OS aims to make resisting hacking attacks easier, even on fairly low-powered laptops.

“It's designed for anybody who wants an end-point that's resistant against remote network exploitation,” David Mirza Ahmad, president of Subgraph, said in a phone interview. Subgraph’s four-man team recently received funding from the Open Technology Fund (OTF) to work on the operating system; the OTF is ultimately funded by grants from Congress.

Read more

Security Leftovers

Filed under
Security

Security Leftovers

Filed under
Security
  • Security advisories for Monday
  • Kaminsky: A Skeleton Key of Unknown Strength
  • A Skeleton Key of Unknown Strength

    TL;DR: The glibc DNS bug (CVE-2015-7547) is unusually bad. Even Shellshock and Heartbleed tended to affect things we knew were on the network and knew we had to defend. This affects a universally used library (glibc) at a universally used protocol (DNS). Generic tools that we didn’t even know had network surface (sudo) are thus exposed, as is software written in programming languages designed explicitly to be safe. Who can exploit this vulnerability? We know unambiguously that an attacker directly on our networks can take over many systems running Linux. What we are unsure of is whether an attacker anywhere on the Internet is similarly empowered, given only the trivial capacity to cause our systems to look up addresses inside their malicious domains.

  • IPFire 2.17 Core Update 98 Patches Glibc Vulnerability for the Linux Firewall

    Michael Tremer, a developer working on the open source IPFire Linux firewall project, announced on February 22, 2016, the availability of a new Core Update for the distribution.

GNU cpio Vulnerabilities Closed in Ubuntu OSes

Filed under
Security
Ubuntu

Canonical has just revealed that a couple of GNU cpio vulnerabilities were found and fixed in Ubuntu 15.10, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS operating systems.

Read more

Also: Canonical Patches Five New Linux Kernel Vulnerabilities in Ubuntu 15.10

Minor Linux Kernel Vulnerability Patched in Ubuntu 12.04 LTS (Precise Pangolin)

Security Leftovers

Filed under
Security
  • SMEs vulnerable through insufficient IT, data security

    Small businesses are particularly vulnerable to breaches of IT security, according to a newly published survey which finds that security of data and IT systems is a growing concern for business leaders across Australia.

    Despite facing the same online risks as larger corporates, research by recruitment agency Robert Half the shows that small and medium businesses typically use fewer data protection tools than large companies.

  • US School Agrees to Pay $8,500 to Get Rid of Ransomware [Ed: Microsoft Windows]

    Administrators of the Horry County school district (South Carolina, US) have agreed to make a $8,500 / €7,600 payment to get rid of a ransomware infection that has affected the school's servers.

  • Linux Computers Targeted with Fresh Fysbis Spying Malware

    One fresh malicious program called Fysbis, whose other name is Linux.BackDoor.Fysbis has been created for targeting Linux computers through installation of a backdoor which reportedly opens the machine's access to the malware owner, thus facilitating him with spying on the user as well as carrying out more attacks.

  • CVE-2016-2384: arbitrary code execution due to a double-free in the usb-midi linux kernel driver

    This post describes an exploitable vulnerability (CVE-2016-2384) in the usb-midi Linux kernel driver. The vulnerability is present only if the usb-midi module is enabled, but as far as I can see many modern distributions do this. The bug has been fixed upstream.

Syndicate content

More in Tux Machines

Linux Devices

Tanglu 4 "Dasyatis Kuhlii" Enters Beta, Ships with Linux Kernel 4.6 & GNOME 3.20

Matthias Klumpp informs the community about the availability of the first Beta build towards the Tanglu 4 "Dasyatis Kuhlii" GNU/Linux operating system, due for release later this year. Tanglu 4 "Dasyatis Kuhlii" Beta is distributed with the usual flavors, including with the KDE and GNOME desktop environments. A Core edition is available as well, designed for those who want to build their own Tanglu-based GNU/Linux distribution. Under the hood, all Tanglu 4 Beta editions are powered by a kernel from the Linux 4.6 series, along with the systemd 229 init system, but each one incorporates some of the latest open-source technologies that correspond to their user base. Read more

Parabola GNU/Linux New install medium 2016.07.27

Dual architecture (i686 and x86_64): Main ISO - Live ISO image for installation and recovery. MATE desktop ISO - Live ISO image for installation and recovery (with MATE Desktop Environment). TalkingParabola ISO - Live ISO image for installation and recovery (adapted for blind and visually impaired users) Read more

Linux Graphics