Language Selection

English French German Italian Portuguese Spanish

Security/Fear, Uncertainty, Doubt/Fear-mongering

Filed under
Security
  • HackIllinois 2020 introduces new software, workshops

    This hackathon has grown to become one of the largest and most well-regarded in the country, with attendees from around the country traveling to Illinois to test and build their hacking skills.
    According to Opensource.com, open-source software is “software with source code that anyone can inspect, modify and enhance,” thereby allowing participants to focus on open exchange and collaboration during the one-of-a-kind event.

  • Hacking Group Outlaw Upgrades Malware for Illicit Income Sources: Report

    Cybersecurity firm Trend Micro has detected that hacking group Outlaw has been updating its toolkit for stealing enterprises’ data for nearly half a year at this point.
    Outlaw — who had ostensibly been silent since last June — became active again in December, with upgrades on their kits’ capabilities, which now target more systems, according to an analysis from Trend Micro published on Feb. 10. The kits in question are designed to steal data from the automotive and finance industries.

  • What happens when all the tiny satellites we’re shooting into space get hacked?
  • Hackers Could Shut Down Satellites—or Turn Them into Weapons

    Last month, SpaceX became the operator of the world’s largest active satellite constellation. As of the end of January, the company had 242 satellites orbiting the planet with plans to launch 42,000 over the next decade. This is part of its ambitious project to provide internet access across the globe. The race to put satellites in space is on, with Amazon, U.K.-based OneWeb and other companies chomping at the bit to place thousands of satellites in orbit in the coming months.

  • DevOps Alert: 12,000 Jenkins Servers Exposed to DoS Attacks [Ed: The ‘logic’ of this clickbait headline? Same as “1,000 MILLION browser users exposed to x, y, z…”]

    Security researchers are warning that 12,000 cloud automation servers around the world could be hijacked to launch denial of service (DoS) attacks.

More in Tux Machines

Open Source Password Manager Bitwarden Introduces Two New Useful Features: Trash Bin & Vault Timeout

Bitwarden is unquestionably one of the best password managers available for Linux. It’s also a cross-platform solution — so you can use it almost anywhere you like. You can also read our review of Bitwarden if you want to explore more about it. Now, coming back to the news. Recently, Bitwarden introduced two new major features that makes it even better. Read more

6 Kubernetes Security Best Practices Every Linux Administrator Should Know

Kubernetes is a popular container orchestration platform used by many professionals around the world. It’s an open-source platform that enables you to manage containerization, providing you with feature-rich controls. However, Kubernetes is not easy to learn and maintain. To properly secure Kubernetes operations, you need to adopt certain best practices. Read more

Linux at Home – Take a break with rapid gameplay

In this series, we look at a range of home activities where Linux can make the most of our time at home, keeping active and engaged. The change of lifestyle enforced by Covid-19 is an opportunity to expand our horizons, and spend more time on activities we have neglected in the past. We’ve seen welcome relief in the past few weeks in European countries, with marked declines in Covid-19 associated deaths. Sadly, the pandemic is rampant in many countries including Mexico, USA, Brazil, and India. Given that working from home is likely to remain popular, it’s essential we strike a balance. When working from home, it’s very easy to lose track of time. It’s important to take regular breaks. Playing video games offers one avenue. There are many benefits of playing video games. Examples include improved coordination, problem-solving skills, it improves attention and concentration, and much more. Read more

Move Virtual Machine Image to Another Host Using GNOME Boxes

This guide explains the steps you need to move Virtual Machine Image to Another Host Using GNOME Boxes. Read more