Language Selection

English French German Italian Portuguese Spanish

KDE Frameworks 5.55 Released for KDE Plasma 5.15, Improves Android Notifications

Filed under
KDE

Just in time for the February 12 release of the highly anticipated KDE Plasma 5.15 desktop environment, the KDE Frameworks 5.55.0 open-source software suite is now available with dozens of improvements, updates, new features, and countless bug fixes. First and foremost, the Breeze icon theme received lots of new icons, so you should see a pleasing refresh after updating your KDE Plasma desktop to KDE Frameworks 5.55.

Moreover, the exiv2extractor utility received support for BMP, GIF, WebP, and TGA image formats, taglibwriter received support for additional mimetypes, the KIconThemes, KService, KXMLGUI, and Solid components are now built without D-Bus on Android, KNotification received Android notification channel support and support for Android API level < 23, and KTextEditor got a bunch of improvements too.

Read more

Also: KDE Frameworks 5.55 Released With Android Notifications, KWayland Fixes

More in Tux Machines

Security: Sphinx, Ransomware, Webmin, YubiKey

  • Exposed Sphinx Servers Are No Challenge for Hackers [Ed: That’s the same agency and the same troll site that initially promoted the lies and the FUD about VLC]

    A popular open-source text search server, Sphinx offers impressive performance for indexing and searching data in databases or just in files. It is cross-platform, available for Linux, Windows, macOS, Solaris, FreeBSD, and a few other operating systems. [...] CERT-Bund posted the warning on Twitter today alerting network operators and providers about the risk of running Sphinx servers with a default configuration that are open on the web. The organization highlights that Sphinx lacks any authentication mechanisms. Exposing it on the web gives an attacker the possibility "to read, modify or delete any data stored in the Sphinx database."

  • Ransomware Hits Texas Local Governments [iophk: Windows TCO]

    The attack was observed on the morning of August 16 and appears to have been launched by a single threat actor, the DIR announcement reads.

    The State Operations Center (SOC) was activated soon after the attack reports started to come in, and DIR says that all of the entities that were actually or potentially affected appear to have been identified and notified.

    A total of twenty-three entities have been confirmed as impacted so far, and the responders are working on bringing the affected systems back online.

  • Webmin Backdoored for Over a Year

    The security hole impacts Webmin 1.882 through 1.921, but most versions are not vulnerable in their default configuration as the affected feature is not enabled by default. Version 1.890 is affected in the default configuration. The issue has been addressed with the release of Webmin 1.930 and Usermin version 1.780.

  • The YubiKey 5Ci is the 'first' iOS-compatible security key

    Like other YubiKey options in the 5 series, the YubiKey 5Ci supports multiple authentication protocols, including IDO2/WebAuthn, FIDO U2F, OTP (one-time-password), PIV (Smart Card), and OpenPGP.

Android Leftovers

Analysis of the state of play of Open Source policies in EU Member States

The study on OSS policies will answer the following research questions, each of which will be elaborated upon in dedicated chapters: [...] Read more

Android Leftovers