Language Selection

English French German Italian Portuguese Spanish

Malicious Proprietary Software

Filed under
Microsoft
Software
  • Discord Is Not An Acceptable Choice For Free Software Projects

    Discord’s communication is not end to end (e2e) encrypted. It is encrypted only between the individual user and the servers operated by Discord Inc. Their spying extends to every single message sent and received by anyone, including direct messages betweeen users. The service can and does log every message sent, both in-channel and DMs. It is impossible to have a private conversation on Discord, as there will always be an unencrypted log of it stored by Discord. Discord can, at their option, provide those stored messages to any third party they wish, including cops or government snoops, for any reason, even without a legal order, without any obligation to tell you that they have done so.

  • [Attackers] Were Inside Citrix for Five Months

    Networking software giant Citrix Systems says malicious [attackers] were inside its networks for five months between 2018 and 2019, making off with personal and financial data on company employees, contractors, interns, job candidates and their dependents. The disclosure comes almost a year after Citrix acknowledged that digital intruders had broken in by probing its employee accounts for weak passwords.

  • [Vulnerable] firmware lurks inside Dell, HP and Lenovo computers amid supply chain security efforts

    “Firmware is meant to be invisible to the user, and so it’s not surprising that most people don’t pay attention to it,” said Eclypsium CEO Yuriy Bulgin. “However, these components make up the foundation upon which every device, operating system, and application depends.”

    Researchers used unsigned firmware to show how an attacker could compromise an operating system remotely in order to steal network data. The highlighted flaws could also enable “direct-memory access” attacks which exploit a computer’s core operating system.

  • Aera Launches Cognitive ‘Business Brain’ Operating System [Ed: This is NOT an 'operating system". Terms misused these days.]

    Infor labels one of its core brands Infor OS and quite unashamedly uses the term operating system to explain the function of its industry-specific Enterprise Resource Planning (ERP) and Supply Chain Management (SCM) cloud software. Mountain View headquartered Aera Technology has used a similar naming convention within its branding and called its automation-centric cloud platform the Aera Cognitive Operating System.

  • Microsoft Defender ATP for Linux Now In Public Preview

    Microsoft Defender ATP for Linux is now available in a public preview that allows administrators and security professionals to test the product in six different Linux distributions.

  • Keen to check for 'abnormal' user behaviours? Microsoft talks insider risk, AWS imports and compliance at infosec shindig RSA [Ed: “Microsoft talks insider risk”; but Microsoft is the risk]

    As well as widening the preview of Microsoft Threat Protection, a system aimed at a more automated response to threats, the gang has also extended the cross-platform support for Microsoft Defender Advanced Threat Protection (ATP) to include a whole bunch of Linux distributions.

  • Microsoft plans to add Linux support for Chromium-based Edge

    Microsoft fought long and hard to maintain and push its own proprietary browser, even launching Edge, hoping to get away from the stigma against Internet Explorer. However, the dominating market share of Chromium-based browsers finally got to Microsoft, and the company announced it would rebuild Edge with the Chromium source code. Last month, we reported that Microsoft’s Chromium-based Edge was out of development and ready for public deployment.

This week as well (still)

Microsoft binary blobs in "Linux" news

  • Microsoft Defender ATP coming to Linux

    Last week, we reported that Microsoft plans to add Linux support for Chromium-based Edge. This week, Microsoft announced that it will be bringing another of its services to Linux: Microsoft Defender Advanced Threat Protection, which the company describes as follows:

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Python Programming

  • Montréal-Python 76: Tonic Glacier

    At Montreal Python, we encourage you to stay at home - but not to stop writing Python ! This is why we are launching Montreal Python 76 - Tonic Glacier, a spectacularly virtual combo of a conference and, following a few days later, a hackathon to overcome COVID-19 with our keyboards.

  • The Singleton Design Pattern in Python

    In this article, we'll be diving into the Singleton Design Pattern, implemented in Python. As time progresses, software gets more tailored to solving specific problems in different domains. While there are many difference in the application-level of our software, some aspects of software design remain largely the same. These aspects might not remain the same for all software out there but will hold true for a lot of scenarios. Therefore, learning and understanding them will be highly beneficial in helping us build resilient programs. This is the first in a series about Design Patterns in Python and the different patterns that we can utilize to build software.

  • Python Docstrings

    In Python, a function is a group of related statements that performs a specific task. Functions help break our program into smaller and modular chunks. As our program grows larger and larger, functions make it more organized and manageable. Furthermore, it avoids repetition and makes the code reusable.

  • Multiple inheritance and mixin classes in Python

    I recently revisited three old posts on Django class-based views that I wrote for this blog, updating them to Django 3.0 (you can find them here) and noticed once again that the code base uses mixin classes to increase code reuse. I also realised that mixins are not very popular in Python, so I decided to explore them, brushing up my knowledge of the OOP theory in the meanwhile. To fully appreciate the content of the post, be sure you grasp two pillars of the OOP approach: delegation, in particular how it is implemented through inheritance, and polymorphism. This post about delegation and this post about polymorphism contain all you need to understand how Python implements those concepts.

  • PyCoder’s Weekly: Issue #415 (April 7, 2020)
  • Wing Tips: Debug Python Services Running on AWS with Wing Pro

Android Leftovers

Cloud Foundry sees top leadership change

For over a decade, Abby Kearns has been the face of the popular open-source, Platform-as-a-Service (PaaS) cloud, Cloud Foundry. First as the project manager for Pivotal Cloud Foundry and then as the Cloud Foundry Foundation's executive director. Now, Kearns' moving on to another executive position, and CTO Chip Childers has assumed her role as executive director. Childers brings vast experience with Cloud Foundry to the head chair. With five-years under his belt at Cloud Foundry as CTO, he and Kearns have both been Cloud Foundry's public faces. Before he came to Cloud Foundry, he had served as vice-president of Apache Cloudstack Infrastructure-as-a-Service (IaaS). In short, Childers knows cloud technology like the back of his hand. Read more

Stable Kernels: 5.6.3, 5.5.16, and 5.4.31

  • Linux 5.6.3
    I'm announcing the release of the 5.6.3 kernel. All users of the 5.6 kernel series must upgrade. The updated 5.6.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.6.y and can be browsed at the normal kernel.org git web browser: https://git.kernel.org/?p=linux/kernel/git/stable/linux-s...

  • Linux 5.5.16
  • Linux 5.4.31