Tor, Proprietary Software, DRM, and Security
-
New Release: Tor Browser 10.0a9 (Android Only)
Android Tor Browser 10.0a9 is now available from the Tor Browser Alpha download page and also from our distribution directory.
Note: This is an alpha release, an experimental version for users who want to help us test new features. For everyone else, we recommend downloading the latest stable release instead.
-
What Is Google Widevine DRM and Why Do You Need It?
If you’re streaming content from services like Netflix and Hulu, you may have seen a prompt to install Google Widevine. Depending on your device and browser, it may already be built in by default. Either way, many users want to know exactly what it is and what it does. The good news is it isn’t a virus and it’s safe. It’s also required to view certain streaming content.
-
Nitro PDF maker hit by breach it says is 'isolated', sec firm claims otherwise
A software firm that had its origins in Melbourne has suffered a data breach that it has described in a notice to the ASX as "an isolated security incident" but which cyber security provider Cyble has claimed is a massive leak that affects companies like Google, Microsoft, Apple, Chase and Citibank.
-
Biden Campaign App '[Crack]' Shows Him Wearing MAGA Hat, Telling People to Vote Trump
According to a video demonstration published today by experts from Norwegian mobile security company Promon, the software is open to attack via a bug called StrandHogg, which can be abused by malicious hackers to put fake overlay screens over apps and steal sensitive information, including usernames and passwords.
In a test showing how such an attack could appear in the real world, the team was able to exploit the bug and insert a picture overlay on the Biden campaign app.
-
ENTERPRISES SHOULD FIX THESE 25 FLAWS [Ed: NSA fails to mentions Microsoft Windows as a whole (because it has "good" back doors in it)]
The United States National Security Agency identified 25 vulnerabilities in software that are most commonly targeted by state-sponsored attackers from China. Setting aside the question of whether or not the enterprise is more likely to be targeted by nation-state attackers or cyber-criminals, the list provides enterprise IT staff with a good starting place on which vulnerabilities to prioritize.
The vulnerabilities on NSA’s list can be used to gain initial access to enterprise networks by targeting systems directly accessible from the Internet. Seven of the flaws are in remote access gateways, three are found in networking equipment, and three impact public-facing servers. Once in the network, the attacker can use other vulnerabilities to find other systems to compromise and carry out their activities. Seven flaws on the list involve internal servers, two affect Active Directory, and one exists in mobile device management.
- Login or register to post comments
- Printer-friendly version
- 3479 reads
- PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
digiKam 7.7.0 is releasedAfter three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. |
Dilution and Misuse of the "Linux" Brand
|
Samsung, Red Hat to Work on Linux Drivers for Future TechThe metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. |
today's howtos
|
Recent comments
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago