Language Selection

English French German Italian Portuguese Spanish

Security, Fear, Uncertainty, and Doubt

Filed under
Security

  • How IBM i Fits Into a Zero-Trust Security Framework [Ed: Authored by IBM shill funded by IBM]

    One of the hot new trends in cybersecurity these days is the zero-trust security model. Instead of implicitly trusting network traffic behind the firewall, zero-trust demands that traffic have explicit permission to be there. But how does that model work with the strange beast known as IBM i? IT Jungle recently sat down with PJ Kirner, the CTO and co-founder of zero-trust software provider Illumio, to find out.

    Illumio is an eight-year-old venture-backed startup based in Sunnyvale, California, that is working in the field of zero-trust security. It develops an offering, called Illumio Core, that allows companies to begin implementing the zero-trust security model in their own data centers.

    It’s a fairly radical shift in philosophy, Kirner says. “There’s a mentality change from ‘I trust everything’ to . . . ‘I need a policy enforcement point of some sort everywhere, not just in the one place at the boundary of two things,'” he says.

    When fully built out, an IT estate with an active zero-trust security model will resemble a party where only invited guests are allowed in. Building from a whitelist, or “allow list,” is starkly different than starting with a blacklist, or an “exclude list,” Kirner says. “If you start by saying just these two things are not allowed to talk, well, that’s a whole bunch of implicit trust around everything else,” he says.

    Illumio, which recently added support for IBM i systems, begins every zero-trust security engagement by making a map of network traffic behind the firewall. Illumio develops software that does this mapping, which can be quite illuminating in its own right.

  • New Windows 10 vulnerability allows anyone to get admin privileges
  • The virus rears its ugly head....

    There is a virus going around. We thought we were winning the battle against it, but powerful forces and events have allowed it to raise its ugly head and cause unforeseen additional hardship.
    People thought that it was not so bad, they did not listen to reason and take the precautionary measures necessary to protect themselves. In letting down their guard they were unprepared and unprotected.
    After months of machines being turned off, software licenses (with their expiration dates never “dormant”) are up for renewal.
    Many companies, educational institutions and public buildings (like libraries) are turning on their Wintel PCs for the first time in over a year and finding that they need to renew their licenses, not only for what is called an operating system on their computer, but also for many of the closed source, proprietary add-on software packages that owners purchased in a wild attempt to make their hardware somewhat useful.

    [...]

    This variant is called “Windows 11”, and the creator of it seems to be unable to tell you how much havoc it will create for you. Does it run on your otherwise great hardware? You have a decent processor, a lot of RAM, and you bought it just two or three years ago….but it might not run Windows 11.

  • UK.gov's Huawei watchdog says firm made 'no overall improvement' on firmware security but won't say why

    Huawei has made "no overall improvement" in software engineering processes for its UK telecoms equipment's firmware, its GCHQ overseers have warned.

    The Huawei Cyber Security Evaluation Cell (HCSEC) oversight board's annual report for 2020 was noticeably less critical than in previous years – but still says Huawei is dragging its feet in key areas.

  • Northern Train's ticketing system out to lunch as ransomware attack shuts down servers

    Publicly owned rail operator Northern Trains has an excuse somewhat more technical than "leaves on the line" for its latest service disruption: a ransomware attack that has left its self-service ticketing booths out for the count.

    "Last week we experienced technical difficulties with our self-service ticket machines, which meant all have had to be taken offline," a spokesperson for Northern Trains confirmed to the The Register.

  • Fortinet's security appliances hit by remote code execution vulnerability

    Security appliance slinger Fortinet has warned of a critical vulnerability in its products that can be exploited to allow unauthenticated attackers full control over the target system - providing a particular daemon is enabled.

    The vulnerability, discovered by Orange Group security researcher Cyrille Chatras and sent to Fortinet privately for responsible disclosure, lies in the FortiManager and FortiAnalyzer software running atop selected models in the company's FortiGate security appliance family. Should a particular daemon be enabled, the company admitted, a remote attacker can gain full control.

  • Romanian Linux Cryptojacking Cybercriminals Spotted [Ed: This is classic FUD as it's not a Linux issue but a weak password issue]

    Since at least 2020, an active threat organization based in Romania has been running a cryptojacking operation against Linux-based machines using the Golang-based SSH brute force, according to The Hacker News. The campaign's objective is to infect Linux systems with Monero mining applications.

More in Tux Machines

Free Software and More

  • The Apache News Round-up: week ending 15 October 2021

    Happy Friday, everyone. The Apache community has had another great week.

  • The Intelligent Edge – Coming Soon to Arm DevSummit 2021 [Ed: What a ridiculous coredump of mindless buzzwords by SUSE]

    For those of us not keeping score, we’re at the cusp of a technology shockwave that will fundamentally change the way we live, work, and interact with each other. Some call it the fourth industrial revolution (I4). While the third industrial revolution was all about process and product automation, the fourth industrial revolution (from an IT perspective) will center on the fusion of IT and OT.

  • Five of Monday's 'All Things Open' Presentations We Wouldn't Miss - FOSS Force

    If you couldn’t make it to Raleigh, North Carolina to attend this year’s All Things Open, you’re in luck. You can go to the conference’s web site and register for the free online version of the event, which will include live streaming of all presentations happening at the event (including all keynotes), as well as a large number of prerecorded presentations that were put together specifically for the online audience. That’s how we at FOSS Force are planning on attending this year, although downtown Raleigh is only a couple of hours away by car.

  • Community Member Monday: Hlompho Mota

    I am a native of Lesotho, and a dreamer and a person who aspires to make changes. Currently I’m working in a business that serves other businesses in Lesotho to get recognition in the market, and generally grow to become more self-reliant. Other than my business, I do try and dabble in technology and try to understand how it works – and get a sense on how it can be relevant in the area of life that I live in at this moment. But besides that, I consider myself as lifelong learner and I hope that the learning will continue for the rest of my life. Currently, I’m a self-taught developer trying to participate in as many open-source projects as possible, with the hope of bringing much-needed development to my part of the world.

Programming Leftovers

  • Use KPNG to Write Specialized kube-proxiers

    The post will show you how to create a specialized service kube-proxy style network proxier using Kubernetes Proxy NG kpng without interfering with the existing kube-proxy. The kpng project aims at renewing the the default Kubernetes Service implementation, the "kube-proxy". An important feature of kpng is that it can be used as a library to create proxiers outside K8s. While this is useful for CNI-plugins that replaces the kube-proxy it also opens the possibility for anyone to create a proxier for a special purpose.

  • Dirk Eddelbuettel: dang 0.0.14: Several Updates

    A new release of the dang package arrived at CRAN a couple of hours ago, exactly eight months after the previous release. The dang package regroups a few functions of mine that had no other home as for example lsos() from a StackOverflow question from 2009 (!!), the overbought/oversold price band plotter from an older blog post, the market monitor from the last release as well the checkCRANStatus() function recently tweeted about by Tim Taylor. This release regroups a few small edits to several functions, adds a sample function for character encoding reading and conversion using a library already used by R (hence “look Ma, no new depends”), adds a weekday helper, and a sample usage (computing rolling min/max values) of a new simple vector class added to tidyCpp (and the function and class need to get another blog post or study …), and an experimental git sha1sum and date marker (as I am not the fan of autogenerated binaries from repos as opposed to marked released meaning: we may see different binary release with the same version number).

  • Rakudo Weekly News: 2021.42 Learning With

    Daniel Sockwell was inspired by a blog post a few weeks ago about a bouncing balls demo. The result is a new framework for learning Raku, but this time with some nice graphics: Learn Raku With: HTML Balls. Apart from the technical points, it’s also a great way (for people without much programming experience) to get involved with Raku while creating graphics and animations, rather than textual output. Check it out!

  • Russ Allbery: rra-c-util 10.0

    It's been a while since I pushed out a release of my collection of utility libraries and test suite programs, so I've accumulated quite a lot of chanages. Here's a summary; for more, see the NEWS file.

  • 1.56.0 pre-release testing | Inside Rust Blog

    The 1.56.0 pre-release is ready for testing. The release is scheduled for this Thursday, October 21th. Release notes can be found here.

  • Apple Announces The M1 Pro / M1 Max, Asahi Linux Starts Eyeing Their Bring-Up

    Apple today announced the M1 Pro and M1 Max as their most powerful SoCs ever built by the company. The new chips feature up to a 10-core processor, 32-core GPU, and up to 64GB of unified memory. While the Apple M1 was already well regarded for its speed, the M1 Pro and M1 Max are said to deliver up to 70% faster CPU performance than last year's M1. Meanwhile the GPU within the M1 Pro is up to 2x faster than the M1 while the M1 Max's GPU is said to be 4x faster.

Mozilla Firefox: Spyware, Password Loggers, and Performance Monitoring

  • This Week in Glean: Designing a telemetry collection with Glean

    (“This Week in Glean” is a series of blog posts that the Glean Team at Mozilla is using to try to communicate better about our work. They could be release notes, documentation, hopes, dreams, or whatever: so long as it is inspired by Glean.) All “This Week in Glean” blog posts are listed in the TWiG index). Whenever I get a chance to write about Glean, I am usually writing about some aspects of working on Glean. This time around I’m going to turn that on its head by sharing my experience working with Glean as a consumer with metrics to collect, specifically in regards to designing a Nimbus health metrics collection. This post is about sharing what I learned from the experience and what I found to be the most important considerations when designing a telemetry collection. I’ve been helping develop Nimbus, Mozilla’s new experimentation platform, for a while now. It is one of many cross-platform tools written in Rust and it exists as part of the Mozilla Application Services collection of components. With Nimbus being used in more and more products we have a need to monitor its “health”, or how well it is performing in the wild. I took on this task of determining what we would need to measure and designing the telemetry and visualizations because I was interested in experiencing Glean from a consumer’s perspective.

  • Firefox Add-on Reviews: How to choose the right password manager browser extension

    All good password managers should, of course, effectively secure passwords; and they all basically do the same thing—you create a single, easy-to-remember master password to access your labyrinth of complex logins. Password managers not only spare you the hassle of remembering a maze of logins; they can also offer suggestions to help make your passwords even stronger. Fortunately there’s no shortage of capable password protectors out there. But with so many options, how to choose the one that’ll work best for you? Here are some of our favorite password managers. They all offer excellent password protection, but with distinct areas of strength.

  • Mozilla Performance Blog: Performance Sheriff Newsletter (September 2021)

    In September there were 174 alerts generated, resulting in 23 regression bugs being filed on average 6.4 days after the regressing change landed. Welcome to the September 2021 edition of the performance sheriffing newsletter. Here you’ll find the usual summary of our sheriffing efficiency metrics. If you’re interested (and if you have access) you can view the full dashboard.

Red Hat/Fedora Leftovers

  • The NeuroFedora Blog: Next Open NeuroFedora meeting: 25 October 1300 UTC

    Please join us at the next regular Open NeuroFedora team meeting on Monday 25 October at 1300UTC in #fedora-neuro on IRC (Libera.chat). The meeting is a public meeting, and open for everyone to attend.

  • Real-time Analytics News for Week Ending October 16 - RTInsights

    In this week’s real-time analytics news: Red Hat announced updates in its portfolio of tools and programs for building applications on Red Hat OpenShift, and more. Keeping pace with news and developments in the real-time analytics market can be a daunting task. We want to help by providing a summary of some of the items our staff came across each week. Here are some of the news items from this week: Red Hat announced a series of updates in its portfolio of developer tools and programs for developers building applications on Red Hat OpenShift. The updates were to Red Hat OpenShift Pipelines, Red Hat OpenShift GitOps, and the Red Hat build of Quarkus. Additionally, Red Hat expanded the roster of training resources available on Kube By Example.

  • What I learned about Kubernetes and Knative Serverless

    If you happened to miss this year’s Kubernetes Summer Camp, there’s some good news! The sessions were recorded and are available for on-demand viewing. Along with those, you’ll also get access to a variety of downloadable content, including a free O’Reilly e-book.

  • Awards roll call: August to October 2021 [Ed: Those accolades and fake rewards/awards can easily be bought; they let you game the system for money]

    From workplace accolades to product wins, we are proud to be able to highlight some aspects of our company and the recognition they’ve received in the past few months. We recently published our DEI Statement, which declares our commitment to diversity, equity and inclusion—not just for our associates, but for our partners, customers and open source contributors. Our culture is rooted in transparency, collaboration, and inclusion—open source principles that continue to drive our company forward. We see the following awards as a recognition of our open source-driven innovation, where the best ideas can come from anywhere and anyone.