Security Leftovers

-
Linux Concerns: Convenience vs. Security
Once upon a recent time, Linux was more secure than it is today. Only the root user could mount external device, and in many distributions new users were automatically assigned a few groups that limited the hardware they could access. Distributions followed the principle of least privilege (aka least access), under which users, applications, and devices receive only the access to the system that they absolutely require.
-
Security updates for Thursday
-
One Definition Of Lock-in: Running “2003” So Many Years Later
Why do they do it? Run “2003” in 2015! It’s not cost, because Debian GNU/Linux would cost $0. It’s lock-in whether by habit or by application. Lots of folks have invested heavily in applications that still work so they are willing to risk everything, perhaps by adding other layers of security. Why?
-
Imploding Barrels and Other Highlights From Hackfest DefCon
Visiting Las Vegas can feel a bit like being a metal sphere in a pinball machine—you’re tossed from bright lights to blaring shows and back again until you eventually (hopefully) emerge out a hole at your home airport. When you visit Vegas with a swarm of hackers and security researchers, the dizziness gets amped up tenfold and can be laced with a dose of dark mischief.
-
Cisco networking gear can be hijacked, warns company
An attacker can swap out the device's firmware with altered, malicious software.
-
Video Shows a Terrifying Drug Infusion Pump Hack in Action
It’s one thing to talk about security vulnerabilities in a product, but another to provide a proof-of-concept demonstration showing the device being hacked.
That’s what occurred last month when BlackBerry Chief Security Officer David Kleidermacher and security professional Graham Murphy showed how easy it is for hackers to take control of a hospital drug infusion pump by overwriting the device’s firmware with malicious software.
-
August ’15 security fixes for Adobe Flash
...Adobe released updated Flash player plugins which adddress many new vulnerabilities (as usual).
-
- Login or register to post comments
Printer-friendly version
- 1038 reads
PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
- Android Leftovers
- 10 Fun Free and Open Source Turn-Based Strategy Games
- Ubuntu vs Manjaro: Comparing the Different Linux Experiences
- today's leftovers
- Devices/Embedded Leftovers
- Programming Leftovers
- Games: Old World, Broken Sword 5, Psychonauts 2
- Louis-Philippe Véronneau - Introducing metalfinder
- Firefox for Android no longer gives the user control over the browsing experience. Privacy Browser turns off JavaScript by default.
- today's howtos
- Announcing the release of Oracle Linux 8 Update 6
- today's howtos
- Programming Leftovers
- Red Hat Leftovers/Puff Pieces
- Software: Inkscape, Docspell, and Organize
- today's howtos
- Videos: GTK, Nvidia, and More
- Security, Fear-mongering, and Openwashing
- today's howtos
- Today in Techrights
Recent comments
4 hours 52 min ago
4 hours 53 min ago
5 hours 22 min ago
5 hours 25 min ago
13 hours 52 min ago
19 hours 28 min ago
19 hours 32 min ago
20 hours 28 min ago
20 hours 37 min ago
21 hours 4 min ago