Language Selection

English French German Italian Portuguese Spanish

Security

Security Leftovers

Filed under
Security

Security Leftovers

Filed under
Security
  • 602 Gbps DDoS Attack On BBC Proves That 2016 Isn’t Going To Be Any Different

    On New Year’s eve, the BBC website and iPlayer service went down due to a massive Distributed Denial of Service (DDoS) attack. The attack peaked up to 602 Gbps, according to the claims made by the New World Hacking group, who took the responsibility of the attack. In another recent attack, the Republican presidential candidate Donald Trump’s main campaign website was also targeted by the same group.

  • Fatally weak MD5 function torpedoes crypto protections in HTTPS and IPSEC

    If you thought MD5 was banished from HTTPS encryption, you'd be wrong. It turns out the fatally weak cryptographic hash function, along with its only slightly stronger SHA1 cousin, are still widely used in the transport layer security protocol that underpins HTTPS. Now, researchers have devised a series of attacks that exploit the weaknesses to break or degrade key protections provided not only by HTTPS but also other encryption protocols, including Internet Protocol Security and secure shell.

Ubuntu Touch to Support Encryption of User Data

Filed under
Security
Ubuntu

The Ubuntu Touch operating system is also going to provide support for encryption of user data; developers have revealed.

It wasn’t a secret that Ubuntu Touch will get encryption, but it’s also not listed as an upcoming feature. It’s buried in a wiki entry with plans for Ubuntu Touch, but it’s nice to see that it’s still being considered, even if it’s not going to arrive anytime soon.

Read more

Also: Ubuntu ‘Spyware’ Will Be Disabled In Ubuntu 16.04 LTS

Tails 1.8.2 is out

Filed under
GNU
Linux
Security
Debian

This release fixes numerous security issues. All users must upgrade as soon as possible.

Read more

Also: Debian LTS Work December 2015

Security Leftovers

Filed under
Security
  • Friday's security updates
  • Hackers caused a major blackout for the first time

    Hackers were behind a cyber attack on Ukraine in December that had real offline consequences: A blackout that killed electricity to roughly 700,000 homes.

    On December 23, around half the homes in Ukraine's Ivano-Frankivsk region lost power for at least a few hours. Initially reported in Ukrainian media as being caused by hackers, cybersecurity experts have now confirmed that was the case, saying the power company was infected with malicious software.

  • Finland extradites Russian hacking suspect to US

    US authorities are to escort Maxim Senakh out of Finland within a month. They suspect him of stealing millions of dollars from infected computer servers in the US, Finland and elsewhere.

  • Linux Ransomware creators third time unlucky as researchers crack encryption again

    Researchers find Linux.Encoder 3 version still uses buggy encryption and allows file recovery

    Much to the delight of security researchers, a group of malware creators are currently having difficulty getting cryptographic implementations right in their ransomware. This has not happened once but thrice.

Security Leftovers

Filed under
Security
  • Security updates for Thursday
  • SHA-1 Deprecation: Pro, Con, or Extend?

    I read Ryan's article about why SHA-1 should be deprecated faster and why we should veto the proposed extensions. It is an excellent explanation of what's going on. I highly recommend it (and look forward to the complete series when he publishes it):

  • Legacy Verified: Legacy Solutions

    While the previous post explored the historical context in which the SHA-1 deprecation fits, and in the many failures to respond adequately to known risks, it didn’t really address the actual Legacy Verified proposal made by CloudFlare and Facebook, and subsequently endorsed by Twitter, nor how it attempts to mitigate the concerns with continuing SHA-1 allocation.

  • Let’s Encrypt Now Being Abused By Malvertisers

    Encrypting all HTTP traffic has long been considered a key security goal, but there have been two key obstacles to this. First, certificates are not free and many owners are unwilling to pay; secondly the certificates themselves are not always something that could be set up by a site owner.

  • Security Guide: How to Protect Your Infrastructure Against the Basic Attacker
  • Linux.Encoder Authors Couldn’t Correctly Disguise Encryption Key

    Renowned Security Software Company in Russia named Doctor Web happened to be first to detect as well as report one wholly working ransomware Trojan created to infect Linux computers. A sample named Linux.Encoder.1 recently showed quite resembling activity with the notorious CryptoWall ransomware. Fifty percent of the widely used AV engines of VirusTotal could not recognize the sample which broke new ground during the Linux domain. The malware chiefly concentrated on hijacking computers using Web servers as also encrypted critical folders utilized during Web-hosting as well as within Web-development ambience.

Security Leftovers

Filed under
Security
  • Twitter Community Helps Create Improved Linux Encoder Ransomware

    November 2015 saw the emergence of Linux.Encoder.1, the first piece of ransomware to target vulnerable Linux web servers. A programming flaw allowed Bitdefender researchers to obtain the decryption key and provide victims with a free recovery utility.

  • Plain cruelty: Boffins flay Linux ransomware for the third time

    Probably the world's most tragically determined blackhat developers have had their revitalised Linux.Encoder ransomware pwned again by meddling BitDefender whitehats.

    The third iteration of the Linux.Encoder ransomware was unleashed on the world, infecting a paltry 600 servers before a crack team of security analysts returned to rip it apart.

  • Windows and Linux Malware Linked to Chinese DDoS Tool

    Similar-looking malware targeting both Linux and Windows computers has been linked to a DDoSing toolkit sold by Chinese hackers via the ddos[.]tf service, Malware Must Die! reports.

    The malware, codenamed Linux/DDOSTF (or Linux/MrBlack) targets mainly Linux machines running Elasticsearch servers, but it also attacks and infects Windows systems, particularly older Windows XP and Windows 2003 Server instances.

  • Exploiting Silent Circle's Secure Blackphone

    The highly secure device could have been exploited, were it not for the responsible disclosure by a security researcher.

    Any modern device is made up of multiple hardware and software components, any one of which could represent a potential risk. That's a reality that secure mobile phone vendor Silent Circle has learned with its Blackphone, thanks to the responsible security disclosure from Tim Strazzere, director of mobile research at SentinelOne.

  • Severe Silent Circle Blackphone vulnerability lets hackers take over

    Researchers have revealed a severe vulnerability in Silent Circle's Blackphone which could allow attackers to take control of the device's functions.

    Silent Circle's Blackphone, born after former US National Security Agency (NSA) contractor Edward Snowden exposed the intelligence agency's spying practices on the global stage, is a phone peddled to the privacy-conscious. The Blackphone grants users complete control of app permissions and includes encrypted services such as Silent Phone and Silent Text, designed to prevent surveillance and eavesdropping.

    The device runs on PrivatOS, a custom Android build with a set of security-focused tools.

  • Security Notification and Linode Manager Password Reset

    The entire Linode team has been working around the clock to address both this issue and the ongoing DDoS attacks. We've retained a well-known third-party security firm to aid in our investigation. Multiple Federal law enforcement authorities are also investigating and have cases open for both issues. When the thorough investigation is complete, we will share an update on the findings.

  • How Hackers Invaded 30 Million Web Servers On The Internet With A Poem

    From an IP address associated with 32nd Chaos Communication Congress (32c3) taking place in Germany, some unknown hackers sent a poetic message to all the IPv4 addresses on the Internet who left with their web servers port open. Later, the hackers said that they didn’t mean to harm anybody and wished to remind the people the importance of keeping the Internet open and decentralised.

WordPress 4.4.1 Updates for XSS (and 52 other issues)

Filed under
OSS
Security
Web

The first WordPress update of 2016 is out and like many other incremental updates, it is being triggered by a security vulnerability. The single security issue being patched in WordPress 4.4.1 is a cross site scripting vulnerability that could have potentially enabled a site compromised.wordpress

From a general usability and bug perspective there are 52 bugs that WordPress developers are addressing in the 4.4.1 update that spans multiple area of the popular open-source content management system including.

Read more

Security Leftovers

Filed under
Security
  • Security updates for Wednesday
  • Third try is no charm for failed Linux ransomware creators

    Getting cryptographic implementations right is difficult. A group of malware creators is currently experiencing that hard truth, to the amusement of security researchers.

    For the past several months, a group of cybercriminals have been infecting Linux systems -- primarily Web servers -- with a file-encrypting ransomware program that the security industry has dubbed Linux.Encoder.

  • Indian Hackers Attack Pakistani Websites In Response To Pathankot Terror Attack

    An Indian hacking collective named Indian Black Hats has defaced multiple Pakistani websites. This Kerala-based group has dedicated the attack to the little daughter of a Pathankot terror attack martyr. The group told fossBytes, “Harming is not our aim..but if anyone pick their eyes on our mother India..we stand for it”.

Syndicate content

More in Tux Machines

Security Leftovers

GeckoLinux 421 Plasma and SUSE Hack Week

  • GeckoLinux 421 Plasma review - It ain't no dragon
    I heard a lot of good praise about this little distro. My inbox is flooded with requests to take it for a spin, so I decided, hey, so many people are asking. Let us. The thing is, openSUSE derivatives are far and few in between, but the potential and the appeal are definitely there. Something like CentOS on steroids, the way Stella did once, the same noble way Fuduntu tried to emancipate Fedora. Take a somewhat somber distro and pimpify it into submission. GeckoLinux is based on openSUSE Leap, and I chose the Plasma Static edition. There's also a Rolling version, based on Tumbleweed, but that one never worked for me. The test box for this review is Lenovo G50. But wait! Dedoimedo, did you not recently write in your second rejection report that GeckoLinux had failed to boot? Indeed I did. But the combo of yet another firmware update on the laptop and a fresh new download fixed it, allowing for a DVD boot. Somewhat like the painful but successful Fedora exercise back in the day. Tough start, but let's see what gives.
  • La Mapería
    It is Hack Week at SUSE, and I am working on La Mapería (the map store), a little program to generate beautiful printed maps from OpenStreetMap data.
  • HackWeek XIV @SUSE: Tuesday

From Vista 10 to Linux Mint

  • Microsoft Scared into Changes, 5 Reasons to Ditch
    Following a small claims court judgment against them, Microsoft announced they would be making declining their Windows 10 upgrade easier. Why not just switch to Linux as Daniel Robinson highlighted five reasons you should. My Linux Rig spoke to Christine Hall of FOSS Force about her "Linux rig" today and Bryan Lunduke had some thoughts on Canonical's collaboration myth. Dedoimedo reviewed GeckoLinux 421 and Gary Newell tested Peppermint 7 on his new Lenovo Ideapad.
  • After Multi-Month Tone Deaf Shitshow, Microsoft Finally Lets Users Control Obnoxious Windows 10 Upgrade
    Microsoft's decision to offer Windows 10 as a free upgrade to Windows 7 and Windows 8.1 made sense on its surface. It was a nice freebie for users happy to upgrade, and an effective way to herd customers on older Windows iterations onto the latest platform to help consolidate support expense. But Microsoft's upgrade in practice has seen no shortage of criticism from users annoyed by a total lack of control over the update, and Microsoft's violent tone deafness in response to the complaints. For example a Reddit post from an anti-poaching organization made the rounds earlier this year after the 17 GB automatic Windows 10 update resulted in huge per megabyte charges from their satellite broadband ISP. Microsoft's response to these complaints? Ignore them. As complaints grew, Microsoft finally provided a way to fully disable the forced upgrade, but made sure it involved forcing users to modify the registry, something Microsoft knew full well less technical users wouldn't be comfortable attempting to hurdle. [...] Things have been escalating ever since, often to comedic effect. But this week things changed somewhat with the news that Microsoft has struck a $10,000 settlement with a California woman who sued the company after an ill-timed Windows 10 upgrade brought her office computers to a crawl. The woman took Microsoft to court after support failed to help resolve the issue, a spokesman saying Microsoft halted its appeal of the ruling "to avoid the expense of further litigation."
  • Microsoft pays $10,000 to unwilling Windows 10 updater
  • The Linux Setup - Christine Hall, FOSS Force
    On my main desktop, I use Linux Mint 17.1, Rebecca. My main laptop, a 64-bit machine, is running Mint 17.2 Rafaela. The laptop got updated from Rebecca so I could write a review, but the desktop never got upgraded because it’s a 32-bit machine and would require another download, which I haven’t had the time to do. I have another laptop running Bodhi, which might be my favorite distro, but I can be more productive with Mint.
  • Linux Mint 18 Finally Arrives — Download Cinnamon and MATE Edition ISO Files Here
    The wait for the summer’s hottest Linux distro is over and you can finally download the release version of Linux Mint 18 “Sarah”. Often called the best Linux distribution for desktop PCs, Mint 18 comes loaded with new features and Linux 4.4 LTS Kernel.

AMD and Linux

  • The Updated AMD Polaris Firmware Blobs Needed For RX 480 Support Land
    One day ahead of the Radeon RX 480 "Polaris" launch, the necessary firmware updates for the production graphics card support have landed in linux-firmware.git.
  • AMD RX 480 released, AMD will possibly open up Radeon Software
    The next generation of AMD GPU's have launched, and it begins with the AMD RX 480. Benchmarks are now out there along with plenty of info. I don't have the card myself as I have no contacts at AMD, but luckily Phoronix managed to bag a card and he's done plenty of testing as you can imagine. I will be referencing the green site due to other sites obviously focusing on Windows.