Security and Proprietary Software

-
diffoscope 165 released
The diffoscope maintainers are pleased to announce the release of diffoscope version 165. This version includes the following changes:
[ Dimitrios Apostolou ] * Introduce the --no-acl and --no-xattr arguments [later collapsed to --extended-filesystem-attributes] to improve performance. * Avoid calling the external stat command. [ Chris Lamb ] * Collapse --acl and --xattr into --extended-filesystem-attributes to cover all of these extended attributes, defaulting the new option to false (ie. to not check these very expensive external calls). [ Mattia Rizzolo ] * Override several lintian warnings regarding prebuilt binaries in the * source. * Add a pytest.ini file to explicitly use Junit's xunit2 format. * Ignore the Python DeprecationWarning message regarding the `imp` module deprecation as it comes from a third-party library. * debian/rules: filter the content of the d/*.substvars files
-
SonicWall hardware VPNs hit by worst-case 0-zero-day-exploit attacks
“…have information about hacking of a well-known firewall vendor and other security products by this they are silent and do not release press releases for their clients who are under attack due to several 0 days in particular very large companies are vulnerable technology companies,” BleepingComputer was told via email.
-
Cyber Firm SonicWall Says It Was Victim of ‘Sophisticated’ Hack
The Silicon Valley-based company said in a statement that the two products compromised provide users with remote access to internal resources.
The attackers exploited so-called “zero days” -- a newly discovered software flaw -- on certain SonicWall remote access products, the company said in a statement.
-
Former manager of Microsoft Taiwan investigated for fraud
A former manager at the Taiwanese branch of software giant Microsoft was questioned Friday (Jan. 22) about an alleged fraud scam directed against the company.
In 2016 and 2017, Chang Ming-fang (張銘芳) allegedly colluded with managers of other companies to forge orders to obtain discounts and products at lower prices, UDN reported.
-
School laptops sent by government arrive loaded with malware [iophk: Windows TCO]
A number of the devices were found to be infected with a "self-propagating network worm", according to the forum, and they also appeared to be contacting Russian servers, one teacher wrote. The Windows-based laptops were specifically infected with Gamarue.1, a worm Microsoft identified in 2012.
-
Ransomware provides the perfect cover
Look at any list of security challenges that CISOs are most concerned about and you’ll consistently find ransomware on them. It’s no wonder: ransomware attacks cripple organizations due to the costs of downtime, recovery, regulatory penalties, and lost revenue. Unfortunately, cybercriminals have added an extra sting to these attacks: they are using ransomware as a smokescreen to divert security teams from other clandestine activities behind the scenes.
Attackers are using the noise of ransomware to their advantage as it provides the perfect cover to distract attention so they can take aim at their real target: exfiltrating IP [sic], research, and other valuable data from the corporate network.
-
Global ransom DDoS extortionists are retargeting companies
According to Radware, companies that received this letter also received threats in August and September 2020. Security researchers’ analysis of this new wave of ransom letters suggested that the same threat actors from the middle of 2020 are behind these malicious communications.
When the DDoS extortion campaign started in August of 2020, a single Bitcoin was worth approximately $10,000. It’s now worth roughly $30,000. The attackers cited this in the latest round of ransom letters, and it represents the impact the rising price of Bitcoin is having on the threat landscape.
A few hours after receiving the message, organizations were hit by DDoS attacks that exceeded 200 Gbps and lasted over nine hours without slowdown or interruption. A maximum attack size of 237 Gbps was reached with a total duration of nearly 10 hours, the alert warned.
-
Boeing 737 MAX is a reminder of the REAL problem with software | Stop at Zona-M
And that problem almost never is software.
-
- Login or register to post comments
Printer-friendly version
- 2010 reads
PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
Ubuntu: Unbreaking Unbootable Ubuntu, Snaps Shrunk and More
| IBM/Red Hat: Kafka Monthly Digest, Red Hat Upselling, and Cockpit 239
|
LibreOffice 7.1.1 Community available for download
LibreOffice 7.1.1 Community, the first minor release of the LibreOffice 7.1 family, targeted at technology enthusiasts and power users, is available for download from https://www.libreoffice.org/download/. LibreOffice 7.1.1 includes over 90 bug fixes and improvements to document compatibility.
For enterprise-class deployments, TDF strongly recommends the LibreOffice Enterprise family of applications from ecosystem partners, with long-term support options, professional assistance, custom features and Service Level Agreements: https://www.libreoffice.org/download/libreoffice-in-business/.
LibreOffice Community and the LibreOffice Enterprise family of products are based on the LibreOffice Technology platform, the result of years of development efforts with the objective of providing a state of the art office suite not only for the desktop but also for mobile and the cloud.
Products based on LibreOffice Technology are available for major desktop operating systems (Windows, macOS, Linux and Chrome OS), mobile platforms (Android and iOS) and the cloud. They may have a different name, according to each company brand strategy, but they share the same LibreOffice unique advantages, robustness and flexibility.
| croc Is A Tool For Resumable, Encrypted File And Folder Transfers Between Computers (Command Line)
croc is a free and open source command line tool for secure file transfers between computers. It uses relay-assisted peer-to-peer transactions and end-to-end encryption via password-authenticated key exchange. The program is written in Go and is available for Microsoft Windows, macOS, Linux and *BSD.
The idea behind croc is being able to transfer files and folders between cross-platform computers securely, fast and easy. With support for resumable, peer-to-peer transfers. As a bonus feature, croc is also able to securely transfer a short text or URL directly.
The data transfer is done using a relay, either using raw TCP sockets or websockets. When the sender and the receiver are on the same LAN, croc uses a local relay, otherwise a public relay is used. Thanks to this, croc can send files between computers in the same LAN, or over the Internet, without having port-forwarding enabled.
The data going through the relay is encrypted using a PAKE-generated session key. For this, croc uses code phrases, a combination of three random words. By default, a code phrase can only be used once between two parties, so an attacker would have a chance of less than 1 in 4 billion to guess the code phrase correctly to steal the data.
|
Recent comments
33 min 52 sec ago
55 min 7 sec ago
7 hours 38 sec ago
8 hours 20 min ago
9 hours 21 min ago
9 hours 49 min ago
9 hours 51 min ago
15 hours 39 min ago
15 hours 44 min ago
16 hours 41 min ago