Language Selection

English French German Italian Portuguese Spanish

Security

Security Leftovers

Filed under
Security

FOSS CMS News

Filed under
OSS
Security
  • Migrated blog from WordPress to Hugo

    My WordPress blog got hacked two days ago and now twice today. This morning I purged MySQL and restored a good backup from three days ago, changed all DB and WordPress passwords (both the old and new ones were long and autogenerated ones), but not even an hour after the redeploy the hack was back. (It can still be seen on Planet Debian and Planet Ubuntu. Neither the Apache logs nor the Journal had anything obvious, nor were there any new files in global or user www directories, so I’m a bit stumped how this happened. Certainly not due to bruteforcing a password, that would both have shown in the logs and also have triggered ban2fail, so this looks like an actual vulnerability.

  • WordPress 4.7.2

    When WordPress originally announced their latest security update, there were three security fixes. While all security updates can be serious, they didn’t seem too bad. Shortly after, they updated their announcement with a fourth and more serious security problem.

    I have looked after the Debian WordPress package for a while. This is the first time I have heard people actually having their sites hacked almost as soon as this vulnerability was announced.

  • 4 open source tools for doing online surveys

    Ah, the venerable survey. It can be a fast, simple, cheap, and effective way gather the opinions of friends, family, classmates, co-workers, customers, readers, and others.

    Millions turn to proprietary tools like SurveyGizmo, Polldaddy, SurveyMonkey, or even Google Forms to set up their surveys. But if you want more control, not just over the application but also the data you collect, then you'll want to go open source.

    Let's take a look at four open source survey tools that can suit your needs, no matter how simple or complex those needs are.

Security Leftovers

Filed under
Security

Security News

Filed under
Security
  • Lynis – Security Auditing and Hardening Tool for Linux/Unix Systems

    First i want to tell you about system security before going deeper about Lynis. Every system administrator should know/understand about system security, Hardening, etc,. So that we can make our system up and running smoothly without any issues otherwise we have to face so many issues.

  • Security Hygiene for Software Professionals

    As software makers, we face a unique threat model. The computers or accounts we use to develop and deliver software are of more value to an attacker than what ordinary computer users have—cloud service keys can be stolen and used for profit, and the software we ship can be loaded with malware without our knowledge. And that’s before we consider that the code we write has a tremendous value of its own and should be protected.

  • AI isn't just for the good guys anymore

    Last summer at the Black Hat cybersecurity conference, the DARPA Cyber Grand Challenge pitted automated systems against one another, trying to find weaknesses in the others' code and exploit them.

    "This is a great example of how easily machines can find and exploit new vulnerabilities, something we'll likely see increase and become more sophisticated over time," said David Gibson, vice president of strategy and market development at Varonis Systems.

    His company hasn't seen any examples of hackers leveraging artificial intelligence technology or machine learning, but nobody adopts new technologies faster than the sin and hacking industries, he said.

    "So it's safe to assume that hackers are already using AI for their evil purposes," he said.

  • MongoDB And Open Source: Super-Sized Vulnerability? [Ed: TopSpin Security is spinning and lying. MongoDB didn’t have a vulnerability, it was the fault of bad setup.]

OpenSUSE Web Site Cracked, Tumbleweed Update

Filed under
Security
Web
SUSE

Security Leftovers

Filed under
Security
  • Security advisories for Monday
  • There are no militant moderates in security
  • Exploit for Windows DoS zero-day published, patch out on Tuesday?
  • Ransomware Attack Left DC Police Surveillance Blind Shortly Before The Innauguration

    Once exclusively the domain of hospitals with comically-bad IT support, crippling ransomware attacks are increasingly beginning to impact essential infrastructure. Just ask the San Francisco MTA, whose systems were shut down entirely for a spell last fall after a hacker (with a long history of similar attacks) managed to infiltrate their network, forcing the MTA to dole out free rides until the threat was resolved. Or you could ask the St. Louis public library network, which saw 16 city branches crippled last month by a bitcoin-demanding intruder.

    We've also seen a spike in ransomware attacks on our ever-expanding surveillance and security apparatus, DC Police acknowledging this week that 70% of the city's surveillance camera DVRs were infected with malware. The infection was so thorough, DC Police were forced to acknowledge that city police cameras were unable to record much of anything during a three day stretch last month...

  • Hackers hit D.C. police closed-circuit camera network, city officials disclose

    Hackers infected 70 percent of storage devices that record data from D.C. police surveillance cameras eight days before President Trump’s inauguration, forcing major citywide reinstallation efforts, according to the police and the city’s technology office.

  • Network protection laws 'may have opposite effect'

    Laws that have been proposed by the Australian Government to guard communications networks and businesses from cyber attack and sabotage may have the opposite effect from that intended, a coalition of industry groups has warned.

    The warning came jointly from the Australian Industry Group, the Australian Information Industry Association, the Australian Mobile Telecommunications Association and Communications Alliance in a submission to the Parliamentary Joint Committee on Intelligence and Security.

  • Russians Engineer a Brilliant Slot Machine Cheat—And Casinos Have No Fix

    In early June 2014, accountants at the Lumiere Place Casino in St. Louis noticed that several of their slot machines had—just for a couple of days—gone haywire. The government-approved software that powers such machines gives the house a fixed mathematical edge, so that casinos can be certain of how much they’ll earn over the long haul—say, 7.129 cents for every dollar played. But on June 2 and 3, a number of Lumiere’s machines had spit out far more money than they’d consumed, despite not awarding any major jackpots, an aberration known in industry parlance as a negative hold. Since code isn’t prone to sudden fits of madness, the only plausible explanation was that someone was cheating.

    Casino security pulled up the surveillance tapes and eventually spotted the culprit, a black-haired man in his thirties who wore a Polo zip-up and carried a square brown purse. Unlike most slots cheats, he didn’t appear to tinker with any of the machines he targeted, all of which were older models manufactured by Aristocrat Leisure of Australia. Instead he’d simply play, pushing the buttons on a game like Star Drifter or Pelican Pete while furtively holding his iPhone close to the screen.

  • SSL or IPsec: Which is best for IoT network security?

    Internet of Things (IoT) devices are soon expected to outnumber end-user devices by as much as four to one. These applications can be found everywhere—from manufacturing floors and building management to video surveillance and lighting systems.

  • The barriers to using IoT in healthcare: What's stopping the Internet of Things from transforming the industry?

    Big things are expected of the Internet of Things (IoT) in a plethora of industries, and healthcare is no exception. The market is poised to reach $117 billion by 2020 according to business intelligence company MarketResearch.com.

    IoT covers a broad spectrum of interconnected devices communicating across the net that together can have benefits for the treatment of patients, the workloads of practitioners, and the wealth of the nation.

New CloudLinux 7 Kernel Released to Beta with Fix for "Kernel Panic" Issue, More

Filed under
Red Hat
Security

CloudLinux's Mykola Naugolnyi is announcing the availability of an updated kernel version in the Beta repositories of the Red Hat Enterprise Linux-based CloudLinux 7 operating system.

The kernel packages of CloudLinux 7 have been updated to version 3.10.0-427.36.1.lve1.4.37, and they are now available for installation directly from the updates-testing repository. Since kernel version 3.10.0-427.36.1.lve1.4.35, CloudLinux's team managed to backport a fix for a known "Kernel panic" issue.

The new updated CloudLinux 7 kernel build also attempts to implement the ability to ignore root-owned links when checking symlink ownership. Therefore, it is recommended that you update your systems to kernel version 3.10.0-427.36.1.lve1.4.37 as soon as possible.

Read more

Security News

Filed under
Security
  • This dump of Iphone-cracking tools shows how keeping software defects secret makes everyone less secure

    Last month, a hacker took 900GB of data from Cellebrite, an Israeli cyber-arms dealer that was revealed to be selling surveillance and hacking tools to Russia, the UAE, and Turkey.

    Yesterday, that hacker dumped Cellebrite's arsenal of mobile cracking tools, including a suite of tools to attack Apple's Ios devices (Iphones and Ipads).

    The dump reveals that Cellebrite seemingly repackages untested and unaudited jailbreaking tools as lawful interception products and sells them to repressive regimes. It also reveals that suppressing disclosure of security vulnerabilities in commonly used tools does not prevent those vulnerabilities from being independently discovered and weaponized -- it just means that users, white-hat hackers and customers are kept in the dark about lurking vulnerabilities, even as they are exploited in the wild, which only end up coming to light when they are revealed by extraordinary incidents like this week's dump.

  • Gentoo Developer: Is The Linux Desktop Less Secure Than Windows 10?

    Gentoo Linux developer Hanno Böck, who also writes for Golem and runs The Fuzzing Project as a software fuzzing initiative to find issues in software, presented today at FOSDEM 2017 over some Linux desktop security shortcomings and how Microsoft Windows 10 is arguably more secure out-of-the-box.

IPFire 2.19 to Bring Tor 0.2.9.9 and OpenSSL 1.0.2k with New Security Fixes

Filed under
GNU
Linux
Security

Michael Tremer announced the availability for public testing of the upcoming IPFire 2.19 Core Update 109 maintenance release of the open source Linux-based router and firewall distribution.

The most important change included in this update appears to be support for the unbound 1.6.0 recursive and caching DNS resolver in the built-in DNS proxy, which will re-activate QNAME hardening and minimisation below NX domains. The change should also make IPFire check if a router drops DNS responses that are longer than a specific threshold.

Read more

Security News

Filed under
Security
  • Vulnerability Note VU#867968

    Microsoft Windows contains a memory corruption bug in the handling of SMB traffic, which may allow a remote, unauthenticated attacker to cause a denial of service on a vulnerable system.

  • Op-ed: Windows 10 0day exploit goes wild, and so do Microsoft marketers

    There's a zero-day exploit in the wild that exploits a key file-sharing protocol in most supported versions of Windows, including Windows 10, the latest and most secure version of the Microsoft operating system. The exploit is probably not worth worrying about, but you'd never know that based on the statement Microsoft officials issued on Thursday when asked what kind of threat the exploit poses:

    "Windows is the only platform with a customer commitment to investigate reported security issues and proactively update impacted devices as soon as possible," an unnamed spokesperson replied in an e-mail. "We recommend customers use Windows 10 and the Microsoft Edge browser for the best protection."

    An employee at Microsoft's outside PR firm, WE Communications, wouldn't explain why the statement advised customers to use Windows 10 and Edge when the exploit works on all versions of Windows and doesn't require that targets use a browser. Ars reminded the employee that an advisory issued hours earlier by the CERT Coordination Center at Carnegie Mellon University warned that the vulnerability might leave Windows users open to code-execution attacks.

  • Former GCHQ deputy: Cyber attack 'normal 21st century threat'

    A skills shortage and "chaotic" handling of personal data breaches are undermining confidence in the government's ability to protect the UK from cyber attacks.

  • Public Accounts Committee slams government on cybersecurity strategy

    The Public Accounts Committee has taken the government to task over a lack of action on addressing cyber security in the UK – and that poor reporting of breaches and low oversight in general reduces its confidence in the Cabinet Office to protect the country from cyber threats.

    The report cites cyber security as one of the biggest threats that faces the country today, but committee chair Meg Hillier said that the government’s approach to personal data breaches “has been chaotic and does not inspire confidence in its ability to take swift, coordinated and effective action in the face of higher threat attacks”.

  • Cybersecurity firms pilloried by GCHQ technical director over “witchcraft”

    “we are allowing massively incentivised companies to define the public perception of the problem”.

  • Microsoft is disabling older versions of Skype for Mac and Windows on March 1

    [Ed: Microsoft forces people to use the latest surveillance with the latest back doors for wiretaps & remote access]

Syndicate content

More in Tux Machines

F2FS Feature Work For The Linux 4.11 Kernel

The Flash-Friendly File-System (F2FS) will see new features introduced with the Linux 4.11 kernel. F2FS for Linux 4.11 is making use of a separate thread for discards to avoid latency problems during checkpoints and fstrim, some prep work for open-channel SSD support, on-disk bitmaps are being introduced, and various other changes. Read more

Q4OS 1.8.3, Orion

New update of stable Q4OS 'Orion' desktop is available. Bunch of important packages updates and security patches has been delivered, as well as improvements of the native Q4OS update manager application. All the changes are available for existing Q4OS users via the automatic update process. Work on the next major version, Q4OS 2.3 'Scorpion' continues as the Debian Project also nears end of development cycle for the Debian GNU/Linux 9 'Strech' operating system, upon which Q4OS 2.3 will be based. The release date is preliminarily scheduled at about the turn of April and May 2017. Q4OS 'Scorpion' will be supported at least five years from the official release date. Read more

Games for GNU/Linux

today's howtos