Language Selection

English French German Italian Portuguese Spanish

Security

Security Leftovers

Filed under
Security

Tails 1.8 is out

Filed under
GNU
Linux
Security
Debian

This release fixes numerous security issues. All users must upgrade as soon as possible.

Read more

Security Leftovers

Filed under
Security

Security Leftovers

Filed under
Security
  • The Joy of Getting Hacked

    Two weeks ago, the server I host all my personal projects on was hacked by some guy in Ukraine.

  • Microsoft Edge has inherited many of Internet Explorer's security holes

    We're all anxiously awaiting the day that Windows 10's new Edge browser becomes usable. That hasn't happened yet, but it will some day next year. Microsoft Edge should represent a huge improvement in browser security, particularly when compared with the ancient, creaking, and leaky Internet Explorer. Recent events, though, have me wondering if Edge really represents that big of a step forward.

  • DEF CON 23 - Runa Sandvik, Michael Auger - Hacking a Linux-Powered Rifle

    TrackingPoint is an Austin startup known for making precision-guided firearms. These firearms ship with a tightly integrated system coupling a rifle, an ARM-powered scope running a modified version of Linux, and a linked trigger mechanism. The scope can follow targets, calculate ballistics and drastically increase its user's first shot accuracy. The scope can also record video and audio, as well as stream video to other devices using its own wireless network and mobile applications.

  • Supporting secure DNS in glibc
  • TLS in the kernel

    An RFC patch from Dave Watson at Facebook proposes moving the bulk of Transport Layer Security (TLS) processing into the kernel. There are a number of advantages he sees for doing so, but most of the commenters on the patch set seem a bit skeptical about the idea. TLS is, of course, the encryption layer that protects HTTPS and other internet protocols.

  • Let's Encrypt Stats
  • December ’15 security fixes for Adobe Flash

Security Leftovers

Filed under
Security

EFF Launches Open Source Code Security Program to Improve User Privacy

Filed under
OSS
Security

The Electronic Frontier Foundation (EFF) has launched a new security initiative aimed at identifying vulnerabilities in open source code. The move is another sign of the open source world's increasing interest in leveraging the the community to shore up software security in the wake of embarrassments like Heartbleed, the bug found in the popular OpenSSL cryptographic software library that led to so much trouble last year.

Read more

Dutch government to shore up open source security

Filed under
OSS
Security

The Dutch Parliament on Tuesday approved a EUR 0.5 million budget to develop and improve existing open source encryption solutions that are a crucial part of the Internet. The plan is to enhance projects such as OpenSSL, LibreSSL or PolarSSL (mbed TLS).

Read more

Security Leftovers

Filed under
Security
  • Symantec: iOS and OS X users face a surge of fresh security threats

    SECURITY FIRM Symantec has warned that the hacker threat to Apple users has reached unprecedented levels.

    The firm reckons that Apple is a victim of its success, becoming a bigger target as its user base grows. To be fair to Apple most of the problem relates to jailbroken devices, which is not a thing that the firm recommends. We have seen incidents recently that make the most of this. The threat applies to mobile software and the desktop.

  • DoS attack brings UK universities to a virtual standstill

    According to the Telegraph newspaper, universities across the country have been hit by DoS attacks. This means in some cases no internet access, and that means students will have to study like it's 1980 something.

  • U.K. Cops Are Trying to Scare Teen Hackers With House Calls

    It was a summer morning, officer Paul Hastings recalls, when he arrived at a suspected hacker’s house in the northern English city of Hull. There, police had tracked one of the people who’d signed up online for a hacking service called Lizard Stresser that was used to attack companies including Microsoft, Amazon.com, and Sony at the end of 2014. This particularly fearsome cybervigilante was asleep when Hastings knocked, so his dad answered the door.

    The visit was one of about 50 U.K. police made this year to people they say used the Lizard Stresser site, many of them children. The Hull suspect, a teenager, couldn’t have done anything wrong, his dad told Hastings. He spent all his time upstairs, on his computer.

    [...]

    Teen hackers have been pop culture figures since Matthew Broderick starred in WarGames, and the U.K. has a long history with juvenile black hats. In 1994, when U.S. Air Force researchers found an unauthorized user on their systems downloading data, they tracked the hacker to a North London suburb. Working with London police, they found their culprit: a 16-year-old boy in an attic bedroom, as journalist Gordon Corera recounts in Intercept: The Secret History of Computers and Spies.

Open source encryption? Now Netherlands votes to help fund security projects

Filed under
OSS
Security

In what some might see as swimming against the political mainstream, the Netherlands parliament has just decided to back open-source web security with hard cash.

Read more

Security Leftovers

Filed under
Security
Syndicate content

More in Tux Machines

A Look at Android Apps on Chromebook

  • A Look at Android Apps on Chromebook
    When Google announced this week that future Chromebooks (and some current ones) will be able to run Android apps, a booming thunderclap spread across Silicon Valley — and could be heard in the four corners of the world. This news is indeed a game changer, reported nicely here in video form by The Verge.
  • For the first time, Google beat Apple in PC sales — and that's really bad news for Microsoft
    Today, two very important things happened for the future of the PC as we know it. First: For the first time ever, low-cost Google Chromebook laptops outsold Apple's Macs during the most recent quarter, analyst firm IDC tells The Verge.

Leftovers: Software

  • Handling I/O Bursts With QEMU 2.6
    The recent release of QEMU 2.6 has support for allowing guests to do bursts of I/O for a configurable amount of time, whereby the I/O level exceeds the normally allowed limits. Our friends at the consulting firm Igalia have written a blog post about I/O bursts with QEMU 2.6.
  • Shotwell's New Devs Are Doing a Terrific Job, Facebook Integration Works Again
    Shotwell developer Jens Georg announced earlier, May 23, 2016, the general availability of the first point release in the Shotwell 0.23.x stable series of the popular open-source image viewer and organizer software. Shotwell is being used by default in numerous GNU/Linux operating system, including the widely used Ubuntu, but it was abandoned by its developers from the Yorba Foundation a while ago, during which it didn't receive any attention. At the end of April 2016, a group of open source developers decided to take over the maintenance of Shotwell from where Yorba left off, and we already reported on the release of the major Shotwell 0.23.0 version.
  • FreeIPMI 1.5.2 Released

today's howtos

Red Hat and Fedora