Language Selection

English French German Italian Portuguese Spanish

Security Leftovers

Filed under
Security
  • A Step Forward for Security [iophk: "end point compromise negates many theoretical advantages"]

    While we are all mesmerized by the presidential crises, a small, but quite significant change occurred in Congress: the Senate Sergeant at Arms approved the use of Signal by Senate staff. Signal, a product of Open Whisper Systems, provides end-to-end encryption for Apple and Android phones.

  • Why Europe’s dependency on Microsoft is a huge security risk

    On May 12, hackers hit more than a hundred countries, exploiting a stolen N.S.A. tool that targeted vulnerabilities of Microsoft software. The attacks infected only machines running on Windows operative system. Among the victims are public administrative bodies such as NHS hospitals in the UK. Investigate Europe spent months to investigate the dire dependency of European countries on Microsoft – and the security risks this entails

  • NSA told Microsoft about stolen exploits: officials

    Current and former NSA officials say the agency informed Microsoft about the theft of the exploit named EternalBlue after learning of it, making it possible for the Redmond software giant to issue a patch for it in March. The exploit was used in the WannaCry ransomware attacks over last weekend.

  • Shadow Brokers claims Microsoft hand-in-glove with NSA

    The group that released NSA exploits for Windows, which were used in massive ransomware attacks last weekend, has accused Microsoft of being hand-in-glove with The Equation Group, a group that is believed to be a front for the NSA.

  • NSA officials worried about the day its potent hacking tool would get loose. Then it did.

    But for more than five years, the NSA kept using it — through a time period that has seen several serious security breaches — and now the officials' worst fears have been realized. The malicious code at the heart of the WannaCry virus that hit computer systems globally late last week was apparently stolen from the NSA, repackaged by cybercriminals and unleashed on the world for a cyberattack that now ranks as among the most disruptive in history.

  • Shadow Brokers threaten to unleash more hacking tools

    The so-called Shadow Brokers, who claimed responsibility for releasing NSA tools that were used to spread the WannaCry ransomware through the NHS and across the world, said they have a new suite of tools and vulnerabilities in newer software. The possible targets include Microsoft's Windows 10, which was unaffected by the initial attack and is on at least 500m devices around the world.

More in Tux Machines

Games Leftovers

OSS Leftovers

  • Julita Inca Chiroque: Parallel Computing Talk
  • Open Source Monitoring Conference: Speakers, Agendas, and Other Details
    One of today’s leading tech conferences, the Open Source Monitoring Conference (OSMC), is back to bring together some of the brightest monitoring experts from different parts of the world. The four-day event will be held at Holiday Inn Nuremberg City Conference in Germany starting today, November 21st, until November 24th.
  • Why a Dallas-area tech startup opened a KC office
  • Open education: How students save money by creating open textbooks
    Most people consider a college education the key to future success, but for many students, the cost is insurmountable. The growing open educational resource (OER) movement is attempting to address this problem by providing a high-quality, low-cost alternative to traditional textbooks, while at the same time empowering students and educators in innovative ways. One of the leaders in this movement is Robin DeRosa, a professor at Plymouth State University in New Hampshire. I have been enthusiastically following her posts on Twitter and invited her to share her passion for open education with our readers. I am delighted to share our discussion with you.

Android Leftovers

Linux 4.10 To Linux 4.15 Kernel Benchmarks

The ThinkPad X1 Carbon has been enjoying its time on Linux 4.15. In addition to the recent boot time tests and kernel power comparison, here are some raw performance benchmarks looking at the speed from Linux 4.10 through Linux 4.15 Git. With this Broadwell-era Core i7 5600U laptop with 8GB RAM, HD Graphics, and 128GB SATA 3.0 SSD with Ubuntu 17.10 x86_64, the Linux 4.10 through 4.15 Git mainline kernels were benchmarked. Each one was tested "out of the box" and the kernel builds were obtained from the Ubuntu Mainline Kernel archive. Read more