Language Selection

English French German Italian Portuguese Spanish

Security Leftovers

Filed under
Security
  • Friday's security advisories
  • Research Paper: Securing Linux Containers
  • Kaspersky Antivirus accused of creating fake malware for over 10 years

    It basically worked like this: Kaspersky would inject dangerous-looking code into common pieces of software. It would then anonymously submit the files to malware aggregators such as Google-owned VirusTotal. When competitors added the malware to their detection engines, they’d mistakenly flag the original files because of the similar code.

  • Investigating the Computer Security Practices and Needs of Journalists

    Though journalists are often cited as potential users of computer security technologies, their practices and mental models have not been deeply studied by the academic computer security community. Such an understanding, however, is critical to developing technical solutions that can address the real needs of journalists and integrate into their existing practices. We seek to provide that insight in this paper, by investigating the general and computer security practices of 15 journalists in the U.S. and France via in-depth, semi-structured interviews. Among our findings is evidence that existing security tools fail not only due to usability issues but when they actively interfere with other aspects of the journalistic process; that communication methods are typically driven by sources rather than journalists; and that journalists’ organizations play an important role in influencing journalists’ behaviors. Based on these and other findings, we make recommendations to the computer security community for improvements to existing tools and future lines of research.

  • Ten scary hacks I saw at Black Hat and DEF CON

    The highlight of this year’s Black Hat conference was a remote hack of the Jeep Cherokee and other Fiat Chrysler vehicles, demonstrated by security researches Charlie Miller and Chris Valasek.

    The attack was the culmination of a year of painstaking work that involved reverse-engineering car firmware and communications protocols. It eventually allowed the two researchers to hack into the car infotainment systems over mobile data connections and take over brake, steering and other critical systems. The research forced Chrysler to recall 1.4 million automobiles so they could be patched and prompted a car cybersafety legislative proposal from the U.S. Congress.

  • How to hack a Corvette with a text message

    Researchers have demonstrated how a simple text message can be used to control a vehicle.

  • Facebook issues Internet Defense Prize for vulnerability discovery tool

    Facebook has awarded $100,000 to a pair of Ph.D students for their work in the security of C++ programs which resulted in the detection and patching of zero-day vulnerabilities.

More in Tux Machines

today's howtos

  • How to Select All in Vim / Vi

    Knowing how to select all content in Vim or the Vi editor enables you to complete routines like copying and pasting in Linux quickly. The process can be tricky if you don’t understand how to use the editors properly or bind keys. For instance, you can select all in Vim/Vi by combining the gg, V, and G keys. ggVG Before that, you must be in the normal mode and know what the groups of keys mean or do. This article takes you through Vim/Vi modes, commands, and key bindings. You will find it simpler to select and use file contents with this knowledge.

  • How to Use Restic to Backup and Restore Data in Linux

    Restic is an open-source, secure, and cross-platform backup program. Using Restic we can store multiple versions of files and directories in an encrypted repository. Restic can be used to back up data to an external device or to cloud storage. Restic encrypts data with the AES-256 in counter mode and then authenticates it using the Poly1305-AES cryptographic message authentication code. This way Restic guarantees confidentiality and data integrity by utilizing cryptography. Restic does incremental backups which makes it easier and faster compared to some other backup programs. What this means is that it stores a base backup image and then for each subsequent backup, it stores the difference between that base image and the source machine. This leads to increased backup speed as only the modified data is backed up. It also consumes less backup space.

  • How to install PulseEffects on a Chromebook

    Today we are looking at how to install PulseEffects on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

  • Rubenerd: Basic fix between pf tables and macros on FreeBSD

    I worked with a FreeBSD client this morning who’d messed up the pf rules on their VM firewall, and wanted to know how to fix them.

LINMOB.net - Weekly GNU-like Mobile Linux Update (26/2022): Plasma Mobile Gear 22.06, Ubuntu Touch OTA-23 and the MNT Pocket Reform

Extensions coming to GNOME Web, some new Sailfish OS Community News, NOKIA causes a naming dispute and more! Read more

The Best Desktop Environments of 2022

As Linux users, we’re often spoiled for choice when it comes to software. There are some basic programs that we keep coming back to that are so integrated into the stack that we forget they’re even there. However, when it comes to things like desktop environments, it can be hard to determine the best option for exactly what you’re going to use it for. We have reviewed different Linux Desktop Environments, and there’s a lot of overlap between use cases. Here we show you the best Linux Desktop Environments for your particular use case. Read more

Porteus 5.0 is released!

Team Porteus is finally able to announce the immediate availability of Porteus-v5.0 final in EIGHT desktop flavours. Read more