Language Selection

English French German Italian Portuguese Spanish

Security

Renowned cryptographer believes his 'Blackphone' can stop the NSA

Filed under
Security

Revelations about how insecure our communications are have been a daily fixture of the news cycle recently, and it's in this climate that a pair of companies are combining to launch a new smartphone focused on privacy. The Blackphone will run a "security-oriented" version of Android named PrivatOS, which the companies say will allow users to securely place and receive phone calls, text messages, video chat, transfer and store files, and "anonymize your activity" through a VPN.

Read more

No hypervisor vulnerability exploited in OpenSSL site breach

Filed under
Security

The OpenSSL Project confirmed that weak passwords used on the hosting infrastructure led to the compromise of its website, dispelling concerns...

Read more

All Linux Distributions Store Wi-Fi Passwords in Plain Text If You Don’t Use Encryption

Filed under
Linux
Security

My colleague, Silviu Stahie, wrote an interesting article earlier today, regarding the “ability” of the Ubuntu Linux operating system to store Wi-Fi passwords in plain text, “thanks” to the default design of the NetworkManager application, initially developed by Red Hat.

Read more

Reminder to Corporate Press: PHP is Not Linux

Filed under
Linux
Security

Somehow a PHP issue gets described as a "Linux worm" (usually in headlines, too) for many other writers to repeat without researching any further. If there is any issue associated with embedded devices (which cannot be patched easily, if at all), then don't blame Linux; embedded systems just happen to be an area reined by Linux and GNU. Windows would not have coped any better.

Read more

NSA Shows Why We Should Abandon All Proprietary Software and Verify Trust

Filed under
Security

If Europe is serious about cyber security, then it should dump all proprietary software (back doors-friendly software) as soon as possible. Given everything we now know about the NSA, ignorance and uncertainty are no longer an excuse. A Dutch source has just revealed that the NSA cracked 50,000 computer networks. The evidence is overwhelming

Read more

Is open source encryption the answer to NSA snooping?

Filed under
Security

The NSA had cracked Internet encryption.

The NSA was listening in to everything.

European customers were especially concerned, he says.

Fortunately, many of the headlines had been unnecessarily alarmist.

“The earlier types of encryption, with 64 bits or less, the NSA has figured out how to brute force decrypt at least some of that traffic,” he says. “But the more modern, strong encryption, with 128 or 256 encryption units, they can't decrypt that. And it bothers them no end.”

Read more

Symantec Reveals that Cybercriminals Employ New Linux Trojan to Embezzle Data

Filed under
Linux
Security

Security researchers of well-known security firm 'Symantec' have identified a cyber-criminal operation which relies on a new-fangled Linux backdoor, nicknamed Linux.Fokirtor, to embezzle data without being discovered.

Read more

Hacked by the NSA

Filed under
Security

There is little doubt that the NSA’s activities will have a negative effect on the U.S. tech sector. Some countries are already considering mandating that business servers be located in-country in an attempt to thwart intrusions by the agency. The Swiss are taking a further step and have hopes of profiting from their strong privacy laws with “Swiss Cloud,” a cloud service being developed with security in mind by Swisscom, in which the Swiss government has a majority stake.

Read more

Linux in Government and Why There is Still NSA Agenda to Keep Wary Eye on

Filed under
Security

Even as Linux advocates we should recognise that there is a diversity of interests and the agenda of the NSA is to spy on everything and everyone, not to protect our privacy and security.

Read more

Syndicate content

More in Tux Machines

Wayland in Fedora 23 Linux Allows for Use of Multiple Monitors with Different DPIs

Fedora Project, through Christian Schaller, was proud to report on the progress made for the next-generation Wayland display server that it might be used by default on the upcoming major release of the Fedora Linux operating system, Fedora 23. Read more

GNOME Developers Discuss Codenames, GNOME 3.18 Might be Dubbed "Gothenburg"

Allan Day, a GNOME UX designer working for Red Hat and renowned GNOME developer/contributor, opened an interesting discussion on the official GNOME mailing list, about possible codenames for upcoming releases of the acclaimed desktop environment for GNU/Linux operating systems. Read more

Developer lowers Drupal's barrier to entry

From a consumer perspective, I'd like open source to be ubiquitous to the point of invisibility. Using recent Ubuntu distros, I'm always shocked at how professional the environment feels. Just five years ago, you'd need to hunt down drivers and do a bunch of fiddling to get basic things like a sound card working. Now there are so many pushbutton ways to deploy open source tech, from OSes to CMS distros on Pantheon to buying an Android-powered mobile phone. We're not quite to the point where CMS users can feel like open source is transparent; there's still a huge investment in vendors to give you the expertise to manage your Drupal or WordPress site, for example. But we're closer than we were a decade ago, and that's pretty exciting. Read more

Intel invests $60 million in drone venture

Intel is investing $60 million in UAV firm Yuneec, whose prosumer “Typhoon” drones use Android-based controllers. Intel Corp. CEO Brian Krzanich and Yuneec International CEO Tian Yu took to YouTube to announce an Intel investment of more than $60 million in the Hong Kong based company to help develop drone technology. No more details were provided except for Krzanich’s claim that “We’ve got drones on our road map that are going to truly change the world and revolutionize the industry.” One possibility is that Intel plans to equip the drones with its RealSense 3D cameras (see farther below). Read more