Security Leftovers
-
Smurf Attack
A Smurf attack is a type of Denial-of-Service Attack (DOS) where an attacker exploits internet control message protocol (ICMP) packets. The attack surfaces when an attacker sends a massive flood of spoofed ICMP echo_request packets to the target victim.
This article will learn about how a Smurf attack is executed and how much damage a Smurf attack can cause to a network. The article will also describe preventive measures against a Smurf attack.
-
MAC Flooding Attack
A data link layer acts as a medium for communication between two directly connected hosts. At the sending front, it transforms the data stream into signals bit by bit and transfers it to the hardware. On the contrary, as a receiver, it receives data in the shape of electrical signals and transforms them into an identifiable frame.
MAC can be classified as a sublayer of the data link layer that is accountable for physical addressing. MAC address is a unique address for a network adapter allocated by the manufactures for transmitting data to the destination host. If a device has several network adapters i.e., Ethernet, Wi-Fi, Bluetooth, etc., there would be different MAC addresses for each standard.
In this article, you’ll learn how this sublayer gets manipulated to execute the MAC flooding attack and how we can prevent the attack from happening.
-
"LemonDuck": New crypto malware targeting Windows, Linux systems [Ed: Media that acts as if Microsoft is an authority in security rather than provocateur working for NSA]
Microsoft has warned customers about a new crypto mining malware that can steal credentials, remove security controls, spread via emails and ultimately drop more tools for human-operated activity.
-
BLAKE3 v1.0 Released - Faster & More Secure Than SHA-1, Etc - Phoronix
The BLAKE3 cryotpgraphic hash function that was announced last year and based on its predecessor BLAKE2 has now reached version 1.0 for its official/reference software implementation. BLAKE3 continues to be much faster than BLAKE2 while also being much faster than the likes of SHA-1/SHA--2/SHA-3 and even MD5 while being more secure.
- Login or register to post comments
- Printer-friendly version
- 3305 reads
- PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
digiKam 7.7.0 is releasedAfter three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. |
Dilution and Misuse of the "Linux" Brand
|
Samsung, Red Hat to Work on Linux Drivers for Future TechThe metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. |
today's howtos
|
Microsoft 'Security'
Microsoft warns of evolved LemonDuck malware targeting Windows and Linux machines[Ed: Dev Kundaliya plays along with this laughable lie that Microsoft is some kind of security expert]
Microsoft Warns of LemonDuck Malware Targeting Windows and Linux Systems [Ed: More ridiculous Microsoft megaphones]
More of that same nonsense
Crypto malware LemonDuck targeting Windows, Linux devices [Ed: Still mindlessly pushing Microsoft talking points, despite a history of lying, cover-up, and deflection.]
LemonDuck Shows Malware Can Evolve, Putting Linux and Microsoft at Risk [Ed: Helping Microsoft Googlebomb "Linux" with FUD]