Language Selection

English French German Italian Portuguese Spanish

Security

'Severe' OpenSSL vuln busts public key crypto

Filed under
Security

theregister.co.uk: Computer scientists say they've discovered a "severe vulnerability" in the world's most widely used software encryption package that allows them to retrieve a machine's secret cryptographic key.

The Perils of Sudo With User Passwords

Filed under
Security

longitudetech.com: The consensus among new Unix and Linux users seems to be that sudo is more secure than using the root account, because it requires you type your password to perform potentially harmful actions. In reality, a compromised user account, which is no big deal normally, is instantly root in most setups.

Chuck Norris is not a Linux virus

Filed under
Linux
Security

itworld.com: Get a grip people. A recent story about the so-called Chuck Norris botnet implies that it breaks Linux's security. Wrong.

LUKS mermaids of remote unlock

Filed under
Security

geekscrap.com: Recently, I’ve browsed several how-to’s regarding the possibility of unlocking a LUKS root volume remotely using an SSH connection. The problem with their approach is simple: they asked how to fix their setup, but forgot to ask what they’re trying to protect.

Quick and easy Linux security

Filed under
Linux
Security
HowTos

ghacks.net: You’ve just set up your Linux desktop. Naturally you want it to be as secure as possible. You’ve heard the rumors that, out of the box, Linux has outstanding security. Is it true? Do you really want to take a chance with that? Most likely not. But what can you do?

Tor Project servers hacked

Filed under
Security
Web

h-online.com: The Tor project developers have advised users to update their Tor anonymity software to version 0.2.1.22 or 0.2.2.7-alpha as soon as possible. This is because, in early January, two of the project's seven directory authorities (moria1 and gabelmoo) as well as the metrics.torproject.org statistics server were found to have been hacked.

How Travelers Can Protect Their Data

Filed under
Security

pthree.org: This post is not meant to be a sure method for defeating attackers. That you can make the process so tedious and time consuming for the attacker, that he will likely not bother and move to another victim. This post is about those methods.

Hold that (trojan) horse!

Filed under
Linux
Security

toolbox.com/blogs: The current news making a big splash around the Linux community is of a trojan that has been created and deployed on the Gnome-look website. For a start this trojan can not automatically install itself. It is not a virus and relies on social engineering to be effective.

The Malware Problem (and a solution)

Filed under
Linux
Software
Security

amarok.kde.org/blog: Some of you might have heard about the Malware incident that recently has hit our friends from gnome-look.org. While some of you might chuckle, there have been some discussions about possible solutions for this issue.

Malware Hidden Inside Screensaver On Gnome-Look

Filed under
Software
Security

omgubuntu.co.uk: Malware has been found hidden inside an innocuous 'waterfall' screensaver .deb file made available on popular artwork sharing site Gnome-Look.org.

Syndicate content

More in Tux Machines

Popcorn Time Makes Watching Movies Safer with Integrated VPN

Popcorn Time, an application that lets users stream movies and TV shows directly from torrents without having to download them, has been upgraded to version 0.3.6 and is now available for download. Read more

4MRecover 11.0 Beta OS Can Help Users Recover Lost Files

4MRecover 11.0 Beta, a new distribution based on 4MLinux that is designed to be used specifically for file recovery, is now available for download and testing. Read more

Android Leftovers

Will New Google Android Live TV Outfox Apple?

Google then rolled out its $35 Chromecast dongle, a streaming device, in mid-2013. Google's new Android TV operating system is expected to make it easier for software developers to move apps from mobile devices to TVs. Read more