Language Selection

English French German Italian Portuguese Spanish

Security

Why your Linux PC isn't vulnerable to the devastating XOR DDoS malware

Filed under
Linux
Security

Linux isn’t perfectly secure, but there’s no big Linux exploit story here. The real problem is how many poorly configured Linux systems exist in the real world. Linux isn’t a magic bullet that will make a system secure—it has to be locked down properly, too.

Read more

Qubes 3.0

Filed under
GNU
Linux
Security

About 5 months after the initial release of Qubes 3.0-rc1, we're now releasing the final 3.0 today!

Let me quickly recap the main "killer features" of Qubes OS 3.0 compared to the Release 2.

Read more

Why a Linux-powered botnet shouldn't send you scurrying back to Windows

Filed under
GNU
Linux
Security

However, even if you're running a Linux-based OS on your desktop there's a good chance you're not vulnerable to the malware that is forcing machines to join this botnet.

For a start, Ubuntu, one of the most popular Linux-based operating systems, isn't set up in a way that allows new users to get infected.

Read more

XOR DDoS Malware for Linux Attacks Have Been Greatly Exaggerated

Filed under
Linux
Security

Reports have been coming in about a new Trojan malware named XOR DDoS that has been responsible for a number of DDoS attacks in Asia. It's coming from Linux machines, and people are going wild. The truth is somewhat different from what's been published until now.

Read more

Container Security with SELinux and CoreOS

Filed under
OS
Linux
Security

At CoreOS, running containers securely is a number one priority. We recently landed a number of features that are helping make CoreOS Linux a trusted and even more secure place to run containers.

As of the 808.0.0 release, CoreOS Linux is tightly integrated with SELinux to enforce fine-grained permissions for applications. Building on top of these permissions, our container runtime, rkt, has gained support for SVirt in addition to a default SELinux policy.

Read more

Security Leftovers

Filed under
Security

Bromium Makes Open Source Security Research Tool Available

Filed under
OSS
Security

The open source community generally hasn’t produced many security analysis tools. For the most part, the tools required to do malware research are available only under a commercial license from security vendors that sell security software and hardware.

Read more

Canonical Patches Two Linux Kernel Vulnerabilities in Ubuntu 14.04 LTS

Filed under
Security
Ubuntu

Just a few moments ago, Canonical has announced that a new kernel update is available for its current long-term supported Ubuntu Linux operating system, Ubuntu 14.04 LTS (Trusty Tahr), patching two critical issues discovered by various developers.

Read more

Nasty DataBasin bug fixed

Filed under
GNU
Security

DataBasin's Select-Identify, an invaluable tool for many working with salesforce.com, showed erratic behaviour: extremely hard to reproduce even by sometimes re-running the same query on the same data set, the operation would just stop without any error in the console log, trapped exception or else.

After extensive debugging I found the problem in the queryMore method of the API implementation in DataBasinKit. If queryMore had to return just one record, it would malfunction.
Technically this happened because the size reported by Salesforce.com in the queryMore is not the size of the objects of the queryMore, but of the original query.

Read more

Syndicate content

More in Tux Machines

More From Red Hat Summit

Android Leftovers

Ubuntu 16.10 Alpha 1 to Come Only in Ubuntu MATE, Ubuntu Kylin & Lubuntu Flavors

In only two days from the moment of writing this article, we will be able to get a very early taste of the upcoming Ubuntu 16.10 (Yakkety Yak) operating system, as the first Alpha build should be released, as planned, on June 30, 2016. Read more

Lenovo and Red Hat advance partnership with telco push

Two Triangle tech titans are teaming up to create cloud solutions for the changing telco space: Lenovo and Red Hat. It’s not their first collaboration, says Brian Connors, vice president of next generation IT and business development in Lenovo’s Research Triangle Park-based Data Center Group. Red Hat even invested in Lenovo’s RTP executive briefing center, where its technology is currently “displayed prominently as customers come in." Read more