The average successful hack gains attackers less than $US15,000 ($A20,600), a recent Ponemon Institute study has found. Yet that may still be enough to lure attackers who are proving adept at navigating “confusing” industry messages on endpoint security, believes one security specialist who argues that the result is hampering companies' ability to shore up privileged-account security.
An attack by a hacker has just revealed the sensitive information of about 20,000 FBI employees. Besides this personal contact information of the FBI employees, the hacker also claims to have more sensitive data like credit card number and some military emails.
The Internet of Things is amazingly powerful and useful — but not always safe to use, and most organizations with IoT implementations need to do a better job of keeping them secure. That's a message that Jerry Irvine, CIO of the Chicago IT services company, Prescient Solutions, would like his fellow CIOs to take to heart. In an interview with The Enterprisers Project, he explains why.
Many of the protections being discussed for the kernel are coming out of the grsecurity patches. These patches have been around for a very long time and provide a set of modern security features. The question always comes up "but why aren't they in the mainline kernel if they are so useful?". The simplest answer is that the authors and the kernel maintainers never came to an agreement about the patches so they were never merged. (The full history is available in various mailing lists for those who are interested. Google will find you plenty of interesting reading.) The patch authors have been doing the hard work of rebasing and reworking the patches to work with newer kernel versions ever since.
New Ubuntu Phone Patch Is Coming Soon to Fix the Infamous Mir Bug, Says Canonical
Just a few moments ago, Łukasz Zemczak of Canonical sent in his daily report email to inform us about the latest work done by the Ubuntu Touch developers in preparation for the upcoming OTA releases.
Docker's recent acquisition of Unikernel Systems has sent pulses racing in the microservice world. At the same time, many people have no clue what to make of it, so here's a quick explanation of why this move is a good thing.
Although you may not be involved in building or maintaining microservice-based software, you certainly use it. Many popular Web sites and services are powered by microservices, such as Netflix, eBay and PayPal. Microservice architectures lend themselves to cloud computing and "scale on demand", so you're sure to see more of it in the future.
The Linux Foundation’s Core Infrastructure Initiative Working with White House on Cybersecurity National Action Plan
The White House today announced its Cybersecurity National Action Plan (CNAP), which includes a series of steps and programs to enhance cybersecurity capabilities within the Federal Government and across the country. In the proposal, the White House announced collaboration with The Linux Foundation’s Core Infrastructure Initiative(CII) to better secure Internet "utilities" such as open-source software, protocols and standards.