Language Selection

English French German Italian Portuguese Spanish

Security

Security Leftovers

Filed under
Security

Ubuntu 16.04 LTS Users Get New Kernel Live Update, 14 Vulnerabilities Patched

Filed under
Security
Ubuntu

If you're using Canonical's kernel live patch update system for rebootless Linux kernel updates, Benjamin M. Romer is informing users about the availability of a major patch.

Read more

Security Leftovers

Filed under
Security
  • Using Microsegmentation to Prevent Security Breaches

    No one likes to admit it but most of what has passed for IT security in the enterprise has historically been rudimentary at best. Most organizations physically segmented their networks behind a series of firewalls deployed at the edge of the network. The trouble is that once malware gets past the firewall it could move laterally almost anywhere in the data center.

    With the rise of network virtualization, a new approach to microsegmenting networks is now possible. The new approach involves using microsegmenting to prevent malware from laterally generating East-West traffic across the data center. Instead of a physical instance of a firewall, there is now a virtual instance of a firewall that is simpler to provision and update.

  • Latest Exploit Dump By Shadow Brokers Contains Easy-To-Use Windows Exploits, Most Already Patched By Microsoft [Ed: Sad to see TechDirt repeating Microsoft's lies in the same way many ‘journalists’ repeated Apple lies after Vault 7 revelations. Some of the holes remain unpatched, and some versions (still under support) will always remain unpatched.]

    Not that those with the latest and greatest should rest easy. The NSA hasn't stopped producing and purchasing exploits. The SB stash was a few years old. Current Microsoft software remains under attack from state intelligence agencies and criminals. But this dump of tools shows just how powerful the NSA's toolkit is -- one made even more dangerous by its apparent ease of use. It makes exploit delivery possible for anyone, not just those with a very specific skillset.

  • Leaked NSA exploits plant a bull's-eye on Windows Server

    Friday’s release of suspected NSA spying tools is bad news for companies running Windows Server. The cyberweapons, which are now publicly available, can easily hack older versions of the OS.

    The Shadow Brokers, a mysterious hacking group, leaked the files online, setting off worries that cybercriminals will incorporate them in their own hacks.

  • The YARA tool for Linux security - part 001.
  • Twistlock 2.0 Improves Container Security and Compliance

    Container security vendor Twistlock is updating its namesake platform with a 2.0 release that aims to help improve container visibility and security.

    Twistlock first debuted its container security platform in November 2015, providing runtime security options for container deployments. The platform has evolved since then with a steady stream of updates. The new Twistlock 2.0 update, includes several enhanced container security capabilities as well as a new backend code infrastructure.

In Defence of Dmitry Bogatov

Filed under
Security
Debian
  • Statement concerning the arrest of Dmitry Bogatov

    The Debian Project is concerned to hear that one of our members, Dmitry Bogatov, has been arrested by Russian authorities.

    Dmitry is a mathematics teacher, and an active Debian contributor. As a Debian Maintainer, he worked in the Debian Haskell group and currently maintains several packages for command line and system tools.

  • Statement regarding Dmitry Bogatov

    What we know right now is that serious accusations of wrongdoing have been made against a valued member of our community, a person who has, among other things, been a Tor relay operator, Debian Developer, GNU developer, and privacy activist. We are collecting facts, monitoring the situation closely, and sharing information with allied organizations and individuals.

  • Debian Issues Statement Over Arrested Russian Developer

    Debian developer Dmitry Bogatov was arrested by Russian authorities for running a Tor exit node and accused of supporting terrorism.

Security Leftovers and Fixes

Filed under
Security

Security and Microsoft Back/Bug Doors

Filed under
Microsoft
Security
  • Security updates for Friday
  • careful with the chrome HSTS

    I mean, yes, I set the HSTS header, but that was with the same cert that chrome is now insisting can’t be trusted. Why in the world would you permanently store “must have trusted cert” on the basis of an untrusted cert?

  • Hacked NSA tools put Windows users at possible risk

    The hacking group known as Shadow Brokers claims to have released National Security Agency malware designed to break into Windows computers. The software could make millions of Microsoft users vulnerable to malicious parties.

    [...]

    The NSA didn't immediately respond to a request for comment. But this isn't the first US intelligence agency whose tools have been leaked to the public. Just last month, WikiLeaks released techniques it claimed the CIA used for breaking into phones, computers, cars and smart TVs.

  • Leaked NSA point-and-pwn hack tools menace Win2k to Windows 8

    The Shadow Brokers have leaked more hacking tools stolen from the NSA's Equation Group – this time four-year-old exploits that attempt to hijack venerable Windows systems, from Windows 2000 up to Server 2012 and Windows 7 and 8.

    The toolkit puts into anyone's hands – from moronic script kiddies to hardened crims – highly classified nation-state-level weaponry that can potentially compromise and commandeer systems around the world. This is the same powerful toolkit Uncle Sam used once upon a time to hack into and secretly snoop on foreign governments, telcos, banks, and other organizations.

  • Microsoft blocks Kaby Lake and Ryzen PCs from Windows 7, 8 updates

    That means all updates, including security updates, will be unavailable on PCs with brand new hardware running the two older operating systems.

  • Microsoft says U.S. foreign intelligence surveillance requests more than doubled

    Microsoft said it received between 1,000 and 1,499 FISA orders for user content between January and June of 2016, compared to between 0 and 499 during both January-June 2015 as well as the second half of 2015.> Microsoft Corp (MSFT.O) said on Thursday it had received at least a thousand surveillance requests from the U.S. government that sought user content for foreign intelligence purposes during the first half of 2016.

Capsule8 Building Container-Aware Security Platform for Linux

Filed under
Linux
Security

Security startup Capsule8 emerged from its stealth mode in February with a plan to help provide a new model for application container security. In a video interview with eWEEK, Capsule8 CTO Dino Dai Zovi and CEO John Viega explain what's missing from container security today and what they are building to help fill the gap.

"Capsule8 is container-aware, real-time threat protection for Linux-based production environments," Dai Zovi said.

Dai Zovi explained that the company name Capsule8 is a pun on what it does—which is encapsulates security knowledge in software, providing a secure approach to application delivery and deployment.

Read more

An Important Linux Kernel Security Patch Is Available for CentOS 7, Update Now

Filed under
Linux
Red Hat
Security

CentOS maintainer Johnny Hughes has informed the community about the availability of yet another important kernel security update, this time for users of the CentOS Linux 7 operating system series.

Read more

Big Linux bug, low security concerns

Filed under
Linux
Security

This Linux/Android bug sure sounded bad.

The National Institute of Standards and Technology (NIST) and Symantec announced a LinuxKernel ipv4/udp.c bug that made the LinuxKernel 4.4 and earlier vulnerable to remote code-execution. In turn, an attacker could exploit this issue to execute arbitrary code. Worse still, even failed exploits might cause denial-of-service attacks.

There's only one problem with this analysis and the resulting uproar: It's wrong.

Yes, the bug existed. NIST described it as a "critical" bug, and its description makes it sound like it can open Linux and Android-powered devices to attacks via UDP network traffic. The important phrase is "sound like."

Read more

Long Term Support and Security

Filed under
Security
  • Freexian’s report about Debian Long Term Support, March 2017

    Like each month, here comes a report about the work of paid contributors to Debian LTS.

  • Unpatched vulnerability exposes Magento online shops to hacking

    An unpatched vulnerability in the Magento e-commerce platform could allow hackers to upload and execute malicious code on web servers that host online shops.

    The flaw was discovered by researchers from security consultancy DefenseCode and is located in a feature that retrieves preview images for videos hosted on Vimeo. Such videos can be added to product listings in Magento.

    The DefenseCode researchers determined that if the image URL points to a different file, for example a PHP script, Magento will download the file in order to validate it. If the file is not an image, the platform will return a "Disallowed file type" error, but won't actually remove it from the server.

  • NSA's arsenal of Windows hacking tools have leaked

    A new trove of alleged surveillance tools and exploits from the National Security Agency's elite hacking team have been released by the Shadow Brokers' hacking group.

    The group Friday appeared to release tools designed to target Windows PCs and servers, along with presentations and files purporting to detail the agency's methods of carrying out clandestine surveillance.

Syndicate content

More in Tux Machines

Linux and Graphics: AMD and AGL

Red Hat, Fleet Commander, and Fedora 27

  • Fleet Commander Now Ready To Deploy Fedora & RHEL Desktops At Scale
    Fleet Commander is now declared "production ready" by the Red Hat developers working on this software project for easing the process of deploying and managing Fedora/Red Hat desktops across a large number of systems. Fleet Commander builds off the Cockpit web-based administration tools and FreeIPA for making it easier for system administrators to deploy Fedora and Red Hat based systems on a large scale within an organization.
  • A Look At The New Features For Fedora 27
    Fedora 27 is now under its final freeze for release in the next few weeks so here's a recap of the prominent changes coming to this next installment of the Red Hat sponsored Linux distribution. First and foremost, the Fedora Workstation 27 release is making use of GNOME 3.26 and its many exciting improvements, many of which upstream improvements were worked on by Fedora / Red Hat developers. GNOME 3.26 offers better Wayland support, some HiDPI improvements, initial built-in screencast / remote desktop support through Mutter, the reworked GNOME Control Center UI, many app improvements, and more as outlined in that aforelinked article.
  • Is the Stock In Play?: Red Hat Inc (NYSE: RHT)

Android: New Devices

  • ZTE launches crazy, foldable, dual-screened smartphone
    Budget Android company ZTE is launching what has to be its craziest-looking smartphone ever, the Axon M. The M looks like someone took a Nintendo DS, removed the controls, and stuck two big smartphone screens on each side. The Axon M is a whopping 12.1mm thick. A hinge runs along the long side of the phone, and it opens up, just like a Nintendo DS. On each side of the phone, you get a 5.2-inch, 1080p TFT LCD. Open the whole thing up, and when combined the screens sort of become a 6.75-inch, 8:9 aspect ratio, 1920x2160 display. I say "sort of" because of course there's a big seam down the middle.
  • Google's Pixel 2 Earns High Marks in Spite of Dull Design
    As Google's new Pixel 2 smartphones get ready to hit the shelves, reviews of the models have begun mushrooming online. While the new phones generally have received positive grades, many reviewers found the their design boring. "The Pixel 2 hardware is ho-hum," observed Patrick Moorhead, principal analyst at Moor Insights and Strategy.
  •  
  • Surprise! The Pixel 2 is hiding a custom Google SoC for image processing

OSS and Sharing Leftovers

  • GMO Internet introduces open source KYC as blockchain project enters fifth phase
  • Eclipse Science Advances Open Source Technology for Scientific Research
    The Eclipse Science Working Group, a working group of the Eclipse Foundation, today announced the new releases of five open source projects used by the scientific research community to advance and simplify the software used by science projects, like genomic, astrophysics, nuclear simulations, etc. The new project releases are part of an annual release train that is managed by the Science WG.
  • Dmark East Africa to develop open source IT applications
    We have an operation around the region; in South Sudan, Democratic Republic of Congo, Burundi, Kenya and Rwanda. And this has exposed us to different levels of talent across the region.  As a result, we have come to a conclusion that Uganda has special talents in the area of information technology, specifically, product development or software engineering.
  • DevOps Jobs: 4 trends to watch
  • Amazon, PwC join campaign to bring open-source EMR to Puerto Rico in wake of Hurricane Maria
    The first phase of the campaign comprises immediate disaster response. The collaborators will deploy a version of the open-source cloud platform OpenEMR-Plus, which proved successful in response efforts after Hurricane Harvey in Houston. They will also provide supply chain assistance.
  • UK Startup Lifebit Builds on Popular Nextflow Open-Source Genomics Platform
  • Makerbot Labs Is One Step Toward Open Source 3D Printing
    3D printing feels a bit stuck. At the dawn of the 2010s, the device seemed destined to reimagine the creative process, putting the power of additive manufacturing within anyone's grasp. But trend has gone cold since reaching its popular zenith in 2013. While people continue to create amazing things with 3D printing, the "one in every household" promise has been put on temporary—or possibly permanent—hold. But the leader of the once great 3D printing revolution hasn't gone away quietly. In fact, it's done the opposite. Makerbot, the Brooklyn-based startup that sold its first printers back in 2009, is launching a brand new platform, Makerbot Labs, to help turn its 3D printing community into super-users, able to access parts of the printer that were otherwise inaccessible. Makerbot describes this new platform as a place, built for creators, who want to experiment with 3D printing but still have the bedrock of the platform to fall back on if need be.
  • IEEE to develop standard for automotive Ethernet of over 1 Gbps
    Industry body IEEE and the IEEE Standards Association (IEEE-SA) announced the formation of a task force to develop IEEE P802.3ch—Standard for Ethernet physical layer specifications and management parameters for greater than 1 Gbps automotive Ethernet. The new standards development project aims to meet the demand for higher speed Ethernet in the automotive environment to support ongoing technological developments, such as connected cars, advanced driver assisted systems and infotainment systems.