Language Selection

English French German Italian Portuguese Spanish

Security

Antivirus Live CD 17.0-0.99.1 Uses ClamAV 0.99.1 to Clean Your PCs of Viruses

Filed under
Linux
Security

4MLinux developer Zbigniew Konojacki today informs Softpedia about the immediate availability for download of a new build of his Antivirus Live CD tool based on the latest 4MLinux and ClamAV projects.

Read more

Security Leftovers

Filed under
Security
  • Leopard Flower firewall – Protect your bytes

    Several months ago, I decided to explore a somewhat obscure topic of outbound per-application firewall control in Linux. A concept that Windows users are well familiar with, it’s been around for ages, providing Windows folks with a heightened sense of – if not practical factual – protection against rogues residing in their system and trying to phone home.

    In Linux, things are a little different, but with the growing flux of Windows converts arriving at the sandy shores of open-source, the notion of need for outbound control of applications has also risen, giving birth to software designed to allay fears if not resolve problems. My first attempt to play with Leopard Flower and Douane was somewhat frustrating. Now, I’m going to revisit the test, focusing only on the former.

    [...]

    Leopard Flower firewall is an interesting concept. Misplaced, though, for most parts. It caters to a Windows need that does not exist on Linux, and to be frank, has no place in the Microsoft world either. Then, it also tries to resolve a problem of control and knowledge by requiring the user to exercise the necessary control and knowledge. But if they had those to begin with, they wouldn’t need to dabble in per-application firewalls. Furthermore, the software is still fairly immature. There are at least half a dozen little things and changes that can be implemented to make lpfw more elegant, starting with installation and followed by service and GUI model, prompts, robustness, and a few others.

  • Critical bug in libotr could open users of ChatSecure, Adium, Pidgin to compromise
  • Clair 1.0 Brings Advances in Container Security

    CoreOS pushes the open-source container security project to the 1.0 milestone and production stability.
    As container use grows, there is an increasing need to understand from a security perspective what is actually running in a container. That's the goal of CoreOS' Clair container security project, which officially hits the 1.0 milestone today, in an effort to help organizations validate container application security.

Security Leftovers

Filed under
Security
  • Friday's security updates
  • At pwn2Own, Chrome, Flash and Other Key Tools Proved Vulnerable
  • Motor Vehicles Increasingly Vulnerable to Remote Exploits

    As previously reported by the media in and after July 2015, security researchers evaluating automotive cybersecurity were able to demonstrate remote exploits of motor vehicles. The analysis demonstrated the researchers could gain significant control over vehicle functions remotely by exploiting wireless communications vulnerabilities. While the identified vulnerabilities have been addressed, it is important that consumers and manufacturers are aware of the possible threats and how an attacker may seek to remotely exploit vulnerabilities in the future. Third party aftermarket devices with Internet or cellular access plugged into diagnostics ports could also introduce wireless vulnerabilities.

  • Malvertising hits BBC, Newsweek, NYT and MSN

    Links to malware inside online advertising bypassed the security systems of the advertising serving companies and distributed ransomware to unsuspecting ‘link clickers’.

    Earlier this week major websites including BBC, Newsweek, New York Times and MSN ‘hosted’ malvertising on their sites that has been credited as the largest of attack of its type for two years. Previously Google’s DoubleClick and Zedo ad servers were ‘infected’ and YouTube, Amazon and Yahoo websites used advertisements served from them.

    Although ad serving networks try to filter out malicious ones, occasionally altered ones’ slip in. On a high-traffic site, this means a large pool of potential victims. Websites that serve the ads are usually unaware of the problem.

    AppNexus, one of the ad servers said it has an anti-malware detection system called Sherlock it uses to screen ads and also uses a filtering product from a third-party vendor. "We devote considerable financial resources to safeguarding our customers. Unfortunately, bad actors also invest considerably in developing new forms of malware,” said Josh Zeitz, vice president of communications.

  • Security Researcher Goes Missing After Investigating Bangladesh Bank Cyber-Heist

    Tanvir Hassan Zoha, 34, security researcher, has gone missing just days after accusing Bangladesh's central bank officials of negligence, which facilitated the theft of over $81 million from the country's oversea accounts.

Linux Kernel 3.12.57 LTS Out Now with ALSA, EFI, and Xen Improvements, Bugfixes

Filed under
Linux
Security

On March 18, 2016, kernel developer Jiri Slaby announced the release of the fifty-seventh maintenance build of the long-term supported Linux 3.12 kernel series.

Read more

Security Leftovers

Filed under
Security
  • Security updates for Thursday
  • Locky Ransomware Spreading in Massive Spam Attack

    Trustwave said over the last seven days, malware-laced spam has represented 18 percent of total spam collected in its honeypots. Trustwave said malware-infected spam typically represent less than 2 percent of total spam. The recent increase to 18 percent is almost entirely traced to ransomware JavaScript downloaders. Campaigns aren’t continuous, Trustwave reported, but are delivered in hour-long bursts.

  • Considering Docker? Consider Security First

    Containers started making a big splash in IT and dev operations starting in 2014. The benefits of flexibility and go-live times, among many others, are almost undeniable. But large enterprises considering using a container platform for development or IT operations should pause and consider security first.

Security Leftovers

Filed under
Security
  • Big-name sites hit by rash of malicious ads spreading crypto ransomware [Updated]

    Mainstream websites, including those published by The New York Times, the BBC, MSN, and AOL, are falling victim to a new rash of malicious ads that attempt to surreptitiously install crypto ransomware and other malware on the computers of unsuspecting visitors, security firms warned.

    The tainted ads may have exposed tens of thousands of people over the past 24 hours alone, according to a blog post published Monday by Trend Micro. The new campaign started last week when "Angler," a toolkit that sells exploits for Adobe Flash, Microsoft Silverlight, and other widely used Internet software, started pushing laced banner ads through a compromised ad network.

    According to a separate blog post from Trustwave's SpiderLabs group, one JSON-based file being served in the ads has more than 12,000 lines of heavily obfuscated code. When researchers deciphered the code, they discovered it enumerated a long list of security products and tools it avoided in an attempt to remain undetected.

  • VMware fixes XSS flaws in vRealize for Linux

    VMware patched two cross-site scripting issues in several editions of its vRealize cloud software. These flaws could be exploited in stored XSS attacks and could result in the user's workstation being compromised.

  • VMware patches severe XSS flaws in vRealize software

    VMware has patched two serious vulnerabilities in the firm's vRealize software which could lead to remote code execution and the compromise of business workstations.

    In a security advisory posted on Tuesday, the Palo Alto, California-based firm said the "important" vulnerabilities are found within the VMware vRealize Automation and VMware vRealize Business Advanced and Enterprise software platforms.

  • Get ready to patch Git servers, clients – nasty-looking bugs surface

    A chap who found two serious security bugs in Git servers and clients has urged people to patch their software.

    The flaws are present in Git including the 2.x, 1.9 and 1.7 branches, meaning the vulnerabilities have been lurking in the open-source version control tool for years.

    It is possible these two programming blunders can be potentially exploited to corrupt memory or execute malicious code on remote servers and clients. To do so, an attacker would have to craft a Git repository with a tree of files that have extremely long filenames, and then push the repo to a vulnerable server or let a vulnerable client clone it from the internet.

Ubuntu 15.10 for Raspberry Pi 2 Kernel Patched by Canonical to Fix Seven Issues

Filed under
Security

On March 15, 2016, we reported on the fact that Canonical published several new Ubuntu Security Notices to inform the community about important kernel updates for the Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, and Ubuntu 15.10 operating systems.

Read more

Thunderbird’s defective method of enabling anti-virus software to scan incoming POP3 e-mail messages

Filed under
Security

Thunderbird’s method of enabling anti-virus software to scan incoming e-mail messages is explained in the mozillaZine article 'Download each e-mail to a separate file before adding to Inbox' and in Mozilla bug report no. 116443 (the bug report that resulted in the functionality being implemented).

Chromebook/Google/Gentoo Security

Filed under
Gentoo
Google
Security
  • Google has doubled its bounty for a Chromebook hack to $100,000

    Google doubled the bounty it will pay for a successful exploit of its Chromebook laptop to $100,000, sweetening the pot in hopes of drawing more attention from security researchers.

    The larger reward is intended for someone who finds a persistent compromise of a Chromebook in guest mode, according to Google's security blog on Monday.

  • Google's Bug Bounty for a Chromebook Hack Rises to $100,000

    We've reported a few times on bug bounties--cash prizes offered by open source communities to anyone who finds key software bugs--ranging from bounties offered by Google (for the Chrome browser) and Mozilla. This open method of discovering security vulnerabilities has been embraced at Google, especially. In fact, Google has offered up as much as $1 million to people who identify key vulnerabilities in the Chrome browser.

Security Leftovers

Filed under
Security
Syndicate content

More in Tux Machines

Linux Mint's XApps to Get Screen Blanking, Sublime-like Search Bar Lands for Xed

We already know that work on Linux Mint 18.1, the next major release of the popular Ubuntu-based operating system loved by many users, already begun, and Clement Lefebvre shares with us today some of the improvements coming to XApps. Read more

Canonical Releases Snapcraft 2.18 Tool for Creating Snaps in Ubuntu 16.04 LTS

Canonical, through Sergio Schvezov, announced the release of yet another maintenance update to the Snapcraft open-source utility that helps application developers package their apps as Snaps. Read more

The Tiny Internet Project, Part I

As LJ readers well know, Linux drives many of the technologies we use every day, from smart TVs to Web servers. Linux is everywhere—except most homes and classrooms. That's a problem if we want to help breed the next generation of engineers and computer scientists. In fact, if teenagers (or any other group of curious individuals) want to learn about Linux, they often must rely on a geeky friend or parent willing to show them the way. This three-part series seeks to change that by offering a way for anyone to learn about Linux by building what is essentially a tiny, self-contained Internet. Using old equipment and free software, you'll build a private network (with your own domain name), build Web sites, set up an e-mail server, install and use a database, and set up a Linux distro mirror. Read more

Today in Techrights