Language Selection

English French German Italian Portuguese Spanish

Hacker hits Duke U

Filed under
Security

A hacker broke into the Duke University Medical Center computer system last week, stealing thousands of passwords and fragments of Social Security numbers, Duke officials said Friday.

Duke is notifying about 14,000 people, roughly 10,000 of whom are medical center employees, that their information may have been compromised and is advising people to change passwords if they use the same one for multiple purposes.

Other individuals affected include alumni of the Duke University School of Medicine, physicians and other clinicians who registered online for some types of continuing medical education at Duke and others who accessed certain Web pages maintained by the medical school.

The incident is the latest in a series of security breaches nationally at banks and other major organizations that store personal information. This is one of the largest yet to hit the Triangle.

None of the Duke computer databases broken into contained personal financial data or patient information, according to the medical center. The hacker did grab about 5,500 computer passwords and the users' first and last names. In addition, the hacker stole about 9,000 partial Social Security numbers -- either the last four digits or the last six digits.

Full Story.

More in Tux Machines

Comparing live version upgrade methods

When I review a distribution I always begin by performing a fresh installation of the operating system. This gives the latest version of the project a chance to stand on its own without complications. However, many of us do not perform fresh installations on our operating systems each time we want to upgrade to the latest release. Some of us, in order to preserve settings or installed packages, prefer to upgrade our existing operating system without starting over from scratch. This week I decided to take five open source operating systems through an upgrade process from their penultimate release to their latest version. Read more

Porteus Kiosk 4.0 Modular Linux Web Kiosk Released, Drops Chrome 32-bit Support

Porteus Solutions' Tomasz Jokiel announced on May 30, 2016, the release of the final Porteus Kiosk 4.0.0 Web Kiosk operating system based on the latest GNU/Linux technologies and open-source software. Porteus Kiosk 4.0.0 comes three months after the release of the last maintenance build in the Porteus Kiosk 3.x series, introducing numerous new features and improvements. But first, let's take a quick look under the hood, as the OS is now powered by Linux kernel 4.4.11 LTS (Long Term Support), and it's based on the Mozilla Firefox 45.1.1 ESR and Google Chrome 50.0.2661.102 web browsers. Read more

Fresh 10-Way GeForce Linux Benchmarks With The NVIDIA 367.18 Driver

In prepping for our forthcoming GeForce GTX 1070 and GTX 1080 Linux benchmarking, I've been running fresh rounds of benchmarks on my large assortment of GPUs, beginning with the GeForce hardware supported by the NVIDIA 367.18 beta driver. Here are the first of those benchmarks with the ten Maxwell/Kepler GPUs I've tested thus far. Earlier this month I posted the With Pascal Ahead, A 16-Way Recap From NVIDIA's 9800 GTX To Maxwell but in still waiting for my GTX 1070/1080 samples to arrive, I've restarted all of those tests now using the newer 367.18 driver as well as incorporating some extra tests like the recently released F1 2015 for Linux, not having done any SHOC OpenCL tests in a while, etc. Read more

Arch Linux-Based ArchAssault Ethical Hacking Distro Changes Name to ArchStrike

The team over at ArchAssault, a GNU/Linux operating system based on the famous Arch Linux distro and designed for ethical hackers, announced a few minutes ago on their Twitter account that they are changing the OS' name to ArchStrike. Designed from the ground up as a security layer to Arch Linux, the ArchAssault project provides security researchers and hackers with one of the most powerful open source and totally free Linux kernel-based operating system for penetration testing and security auditing operations. Read more