Language Selection

English French German Italian Portuguese Spanish

Security

Open source security is not as big of a concern as it once was

Filed under
OSS
Security

Many tools that are open sourced are more readily usable than the closed source alternatives. The visibility of how the code works allows an end user the ability to quickly integrate the open source tool into existing systems. “When we are examining potential new tools, selecting an open source project which satisfies our needs is typically a better option than the alternatives. This is because we are able to rapidly deploy an open source tool without making a financial commitment to another company. It also lets us determine a proof of concept for using the new project,” he said.

Read more

Linux distros aren't updating WebKit, making web browsers and email clients vulnerable

Filed under
Linux
Security

The WebKit rendering engine used in many Linux applications is a complete security mess. That’s the takeaway from a blog post by Michael Catanzaro, who works on GNOME’s WebKitGTK+ project. He’s sounding the alarm about a problem the open-source community needs to fix.

Read more

FreeBSD, Variants Not Affected by Recent GNU Bug

Filed under
Security
BSD

Much has been made about a vulnerability in a function in the GNU C Library. And searching far and wide over the Internet, there was little — actually nothing — I could find regarding how this affected BSD variants.

However, you can rest easy, BSDers: Not our circus, not our monkeys.

Dag-Erling Smørgrav, a FreeBSD developer since 1998 and the current FreeBSD Security Officer, writes in his blog that “neither FreeBSD itself nor native FreeBSD applications are affected.”

Read more

Security Leftovers

Filed under
Security

Glibc:

Security:

KDE Applications 15.12.2 Released for KDE Plasma 5.5 with over 30 Bugfixes

Filed under
KDE
Security

Just a few moments ago, February 16, 2016, KDE had the pleasure of announcing the release and general availability of the second maintenance build in the stable KDE Applications 15.12 series.

Read more

Top 5 Best Security-Centric Linux Distributions Of 2016

Filed under
GNU
Linux
Security

Staying anonymous on the Internet might not necessarily mean the same as surfing the web safely but rather keeping yourself safe from prying eyes that may otherwise take advantage of the vulnerability of your system thereby exposing you and your data for whomever might just be up for the grabbing – especially some hacker snooping around for sensitive data to hoard (particularly if you’re being targeted) and use for otherwise evil purposes that can have some serious effects on the violated individual.

Read more

Security Leftovers

Filed under
Security
  • Security updates for Monday
  • Russian cyberspy group uses simple yet effective Linux Trojan

    A cyberespionage group of Russian origin known as Pawn Storm is infecting Linux systems with a simple but effective Trojan program that doesn't require highly privileged access.

  • Security update for Chromium 48

    Google released an update for Chrome/Chromium – their version 48 of the browser is now at “48.0.2564.109“. The chromium sources are still not available six days after the announcement, even though the official Chrome binary distributions were available right from the start. I think that this is inexcusable for a big company like Google, but this is not the first time that their autobots falter and no one cares enough to fix the release process. Notwithstanding some complaints by fellow application packagers.

Security Leftovers

Filed under
Security
  • Friday's security updates
  • Internet Providers to Use Private Routers as Public Hotspots

    The Juniper report highlighted the consumer benefits that the policy offers, such as free or reduced-fee access to the operator’s homespot network.
    At least one in three home routers will be used as public WiFi hotspots by 2017, and the total installed base of such dual-use routers will reach 366 million globally by the end of 2020, according to a report from Juniper Research.

  • Will you be my cryptovalentine?

    Over the last few year Free Software Foundation Europe runs a campaign called "I love Free Software Day". It's an opportunity to share your appreciation (or love) with the developers of your favorite Free Software project. So after you are done reading this post, choose your favorite project and send its developer(s) an appreciation email.

    Last year Zak Rogoff , had a great similar idea. On a post he wrote he suggested we use the Valentine's Day as an opportunity to use Free Software in order to setup secure and private communications with our significant other.

  • Pwn2Own Hacking Contest Returns as Joint HPE-Trend Micro Effort

    Over a half million dollars in prize money is up for grabs as the Zero Day Initiative browser hacking contest continues even as corporate ownership shifts.
    The annual Pwn2Own browser hacking competition that takes place at the CanSecWest conference is one of the premier security events in any given year, as security researchers attempt to demonstrate in real time zero-day exploits against modern Web browsers. This year there was initial concern that the event wouldn't happen, as the Zero Day Initiative (ZDI), which is the primary sponsor of Pwn2Own, is currently in a state of transition.

  • Kaspersky Researcher Shows How He Hacked His Hospital While Sitting In His Car

    When we visit a hospital, we put our complete trust in our doctor and the medical equipment that he/she uses. With advancement in technology, these equipment have become more complex and interconnected. Sadly, ensuring standard cybersecurity measures is not a top priority of the medical professionals. This fact was recently outlined by a Kaspersky security researcher who hacked a hospital while sitting in his car.

  • Amazon Cloud is Prepared for the Zombie Apocalypse

    There are a number of reasons why an Amazon Web Services (AWS) user might need to violate the acceptable terms of use - including the onset of a zombie apocalypse.

    Amazon updated its terms of service this week alongside its Lumberyard gaming development platform, with a new provision about acceptable use in connection with safety-critical systems.

Fysbis: The Linux Backdoor Used by Russian Hackers

Filed under
Linux
Security

Fysbis (or Linux.BackDoor.Fysbis) is a new malware family that targets Linux machines, on which it sets up a backdoor that allows the malware's author to spy on victims and carry out further attacks.

Read more

Syndicate content

More in Tux Machines

OpenStack and Containers

Xiaomi Redmi Pro launched – Everything you need to know

Xiaomi is well known for their range of affordable smartphones and tablets, and the company continues to grow their device portfolio with some great options. After much anticipation, Xiaomi has finally taken the wraps off their latest smartphone offering at a launch event in Beijing earlier today. Here’s everything we know about the Xiaomi Redmi Pro! The Redmi Pro features a full metal unibody construction with a brushed metal finish, and up front is a 2.5D glass that covers the 5.5-inch Full HD OLED display. The change to OLED, from the usually standard in this price range IPS LCD, is a nice touch, and should provide a more vivid and pleasing viewing experience. Read more

More on Canonical in the Document Foundation

  • Canonical Takes a Seat On The Document Foundation’s Advisory Board
  • The Document Foundation welcomes Canonical to the project Advisory Board
  • Canonical Joins The Document Foundation Advisory Board
    The Document Foundation today announced that Ubuntu parent company Canonical has joined The Document Foundation Advisory Board. The foundation said Canonical is to provide "experience and insights" to increase the use of LibreOffice in the enterprise and government. Canonical joins the likes of KDE, GNOME, Red Hat, SUSE, and Google on the board. The board's main purpose is to represent the foundation's sponsors and their needs to the Board of Directors, although the BoD isn't under obligation to accept or act on any proposals made by the advisory board. The BoD does, on occasion, solicit advice and guidance from the advisory board and the advisory board does make proposals on behalf of their members. Some of the other members on the Advisory Board include those listed above as well as the Free Software Foundation, Collabora, Intel, the French government, CloudOn, City of Munich government, and AMD.

Blackmagic on GNU/Linux

  • Blackmagic Design Announces Fusion 8.2 is now available on Linux free of charge
    Blackmagic Design today announced that Fusion visual effects software is now available on the Linux platform. Linux is extremely popular in the world's leading visual effects production companies and this new Linux release is a major announcement for the visual effects industry. This new Linux version of Fusion and Fusion Studio means visual effects artists can select their preferred computing platform, as Fusion is now available on Mac OS X, Windows, and Linux. All project files are common, so customers can work collaboratively, even when different artists are running different platforms on the same job.
  • Blackmagic Puts Fusion 8.2 on Linux, Updates Duplicator
    Blackmagic Design released a pair of announcements, the first revealing that Fusion visual effects software is now available on the Linux platform, and second that it has release version 1.0.2 of Duplicator.
  • Blackmagic Design Announces Blackmagic Duplicator 1.0.2 Update