Security: MalwareTech, JavaScript, Vista 10, TPM2, Intel Back Door, Linux Bug, Pizza Hut Breach, Telcos Spying

-
Let MalwareTech Surf! Status Report
-
500 million PCs are being used for stealth cryptocurrency mining online
A month or so ago, torrent search website The Pirate Bay raised concern among the community as visitors noticed their CPU usage surged whenever a page was opened.
-
Dutch slam Windows 10 for breaking privacy laws
Dutch authorities claim Microsoft’s Windows 10 operating system is violating data protection and privacy laws, and warned they may impose fines on the US technology giant.
“Microsoft breaches the Dutch data protection law by processing personal data of people that use the Windows 10 operating system on their computers,” the Dutch Data Protection Authority (DPA) said in a statement late Friday.
The company fails to “clearly inform” users of Windows 10 that it “continuously collects personal data about the usage of apps and web surfing behavior through its web browser Edge, when the default settings are used,” the DPA said.
-
Using Elliptic Curve Cryptography with TPM2
One of the most significant advances going from TPM1.2 to TPM2 was the addition of algorithm agility: The ability of TPM2 to work with arbitrary symmetric and asymmetric encryption schemes. In practice, in spite of this much vaunted agile encryption capability, most actual TPM2 chips I’ve seen only support a small number of asymmetric encryption schemes, usually RSA2048 and a couple of Elliptic Curves. However, the ability to support any Elliptic Curve at all is a step up from TPM1.2. This blog post will detail how elliptic curve schemes can be integrated into existing cryptographic systems using TPM2. However, before we start on the practice, we need at least a tiny swing through the theory of Elliptic Curves.
-
Sakaki's EFI Install Guide/Disabling the Intel Management Engine
The Intel Management Engine ('IME' or 'ME') is an out-of-band co-processor integrated in all post-2006 Intel-CPU-based PCs. It has full network and memory access and runs proprietary, signed, closed-source software at ring -3,[1][2][3][4] independently of the BIOS, main CPU and platform operating system[5][6] — a fact which many regard as an unacceptable security risk (particularly given that at least one remotely exploitable security hole has already been reported[7][8]).
-
Linux vulnerable to privilege escalation
An advisory from Cisco issued last Friday, October 13th, gave us the heads-up on a local privilege escalation vulnerability in the Advanced Linux Sound Architecture (ALSA).
The bug is designated CVE-2017-15265, but its Mitre entry was still marked “reserved” at the time of writing. Cisco, however, had this to say about it before release:
-
Pizza Hut was hacked, company says
According to a customer notice emailed from the pizza chain, those who placed an order on its website or mobile app between the morning of Oct. 1 and midday Oct. 2 might have had their information exposed.
The “temporary security intrusion” lasted for about 28 hours, the notice said, and it’s believed that names, billing ZIP codes, delivery addresses, email addresses and payment card information — meaning account number, expiration date and CVV number — were compromised.
-
Want to see something crazy? Open this link on your phone with WiFi turned off
These services are using your mobile phone’s IP address to look up your phone number, your billing information and possibly your phone’s current location as provided by cell phone towers (no GPS or phone location services required). These services are doing this with the assistance of the telco providers.
-
Telcos "selling realtime ability to associate web browsing with name & address"
-
- Login or register to post comments
Printer-friendly version- 1885 reads
PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
Linux Graphics: AMD and NVIDIA
| 96-core NanoPi Fire3 cluster computer blows past RPi rigs in benchmarks
Cluster computer projects are increasingly looking beyond the Raspberry Pi to build devices with faster cluster-friendly SBCs. Here’s a 96-core monster that taps the octa-core NanoPi Fire3.
Cluster computers constructed of Raspberry Pi SBCs have been around for years, ranging from supercomputer-like behemoths to simple hobbyist rigs. More recently, we’ve seen cluster designs that use other open-spec hacker boards, many of which offer higher computer power and faster networking at the same or lower price. Farther below, we’ll examine one recent open source design from Paul Smith at Climbers.net that combines 12 octa-core NanoPi-Fire3 SBCs for a 96-core cluster.
|
Software: gksu Alternatives, bootiso and Yay
| Security: Defective Processors, Malicious Proprietary Software and Cost of Bad Software
|



Content (where original) is available under CC-BY-SA, copyrighted by original author/s.



Recent comments
2 days 11 hours ago
2 days 17 hours ago
3 days 1 hour ago
3 days 14 hours ago
6 days 11 hours ago
6 days 13 hours ago
1 week 3 hours ago
1 week 3 hours ago
1 week 3 hours ago
1 week 8 hours ago