Language Selection

English French German Italian Portuguese Spanish

Security Leftovers

Filed under
Security
  • Intel x86 considered harmful (new paper)

    Back in summer I have read a new book published by one of the core Intel architects about the Management Engine (ME). I didn't quite like what I read there. In fact I even found this a bit depressing, even though Intel ME wasn't particular news to me as we, at the ITL, have already studied this topic quite in-depth, so to say, back in 2008... But, as you can see in the linked article, I believed we could use VT-d to protect the host OS from the potentially malicious ME-based rootkits (which we demonstrated back then).

  • MySQL Windows servers come under malware attack

    Researchers at Symantec say they have discovered a form of malware that attacks MySQL on Windows servers, using them to launch distributed denial of service attacks.

  • Sustaining Digital Certificate Security

    Following our notification, Symantec published a report in response to our inquiries and disclosed that 23 test certificates had been issued without the domain owner’s knowledge covering five organizations, including Google and Opera.

    However, we were still able to find several more questionable certificates using only the Certificate Transparency logs and a few minutes of work. We shared these results with other root store operators on October 6th, to allow them to independently assess and verify our research.

    Symantec performed another audit and, on October 12th, announced that they had found an additional 164 certificates over 76 domains and 2,458 certificates issued for domains that were never registered.

  • British Gas leak sees 2,400 customer passwords posted online

    COOKING AND HEATING ENABLER British Gas has confessed to a data loss that has seen the details of many of its customers released online.

    British Gas has written to affected customers to tell them that, while it may not have been hacked, the effect is the same. It has somehow managed to leak information that has found its way onto the internet and in the direction of ne-er-do-wells.

    Reports have it that 2,399 email addresses and passwords have been leaked online. A package of emails and passwords is a pretty good haul for an online exploiter, particularly if the same details are used for access on other sites and services.

More in Tux Machines

PostgreSQL: pgFormatter v5.2 has been released

Version 5.2 of pgFormatter, a free and reliable tool used to format SQL and PLPGSQL code, has been officially released and is publicly available for download. A demonstration site is available online at http://sqlformat.darold.net/ pgFormatter is the most advanced SQL and PlPgsql code formatter and beautifier dedicated to PostgreSQL. It is provided as a CLI or a CGI program. This is a maintenance release to fix issues reported by users since the last three months. As usual there is also some improvements and new features. Read more Also: PostgreSQL: pgDay Paris 2022 — Call for Papers, Registration, and Sponsors

Tiny four-port net appliance runs Linux on Elkhart Lake

The NCA-1040 runs Linux on Intel’s quad-core, 1.5GHz/3.0GHz Atom x6413E or quad-core, 1.2GHz/3.0GHz Pentium N6415. Both Elkhart Lake processors provide Intel’s new AES-NI instruction set for network security, notes Lanner. The “fanless multi-service gateway” is aimed at “edge environment, branch offices and retail settings for applications such as routing, VoIP, VPN, firewall, IPS/IDS, web filtering, email server, high-volume storage and wireless networking hub,” says the company. Like Aaeon’s very similarly equipped FWS-2280, but unlike the previous Lanner systems, the NCA-1040 supports up to 32GB DDR4 3200 via a single slot. The 4x GbE ports use Intel i211 controllers. There is also an RJ45 console port. Read more

New Videos: Endless OS 4.0.0, KDE Plasma Panels, and Enterprise Linux Security

  1. Linux overview | Endless OS 4.0.0 - Invidious

    In this video, I am going to show an overview of Endless OS 4.0.0 and some of the applications pre-installed.

  2. Me And Plasma Panels Are FRIENDS Again! (DEVLOG) - Kockatoo Tube
  3. Enterprise Linux Security Episode 10 - The worst healthcare breaches of 2021 - Invidious

    Joao and Jay talk about the worst healthcare breaches of 2021, and some lessons that can be learned from these events.

IBM/Red Hat Leftovers

  • 6 edge computing trends to watch in 2022 | The Enterprisers Project

    While many aspects of edge computing aren’t new, the overall picture continues to evolve quickly. For example, “edge computing” encompasses the distributed retail store branch systems that have been around for decades. The term has also swallowed all manner of local factory floor and telecommunications provider computing systems, albeit in a more connected and less proprietary fashion than was the historical norm. Edge computing helps IT and business leaders solve problems as both sensor data and machine learning data proliferates. However, even if we see echoes of older architectures in certain edge computing deployments, we also see developing edge trends that are genuinely new or at least quite different from what existed previously. And they’re helping IT and business leaders solve problems in industries ranging from telco to automotive, for example, as both sensor data and machine learning data proliferates.

  • Digital transformation: Are you using the right metrics? | The Enterprisers Project

    For any digital transformation project to succeed, you need a well-laid-out road map, clear objectives, and bite-sized goals to mark the milestones. And it’s important to put those plans into action and measure their success against the pre-defined relevant metrics. The pandemic made the pace of digital transformation a key performance metric by making it urgent for enterprises to embrace and accelerate digital. Now it’s time to think beyond speed and measure the success of digital transformation against metrics that align with business goals.

  • How customers and partners are meeting growing market demands with Red Hat OpenShift and learning resources

    Which came first: the culture or the technology? Many companies are facing this Catch 22 as they modernize to better meet customer demands. It doesn’t have to be one before the other—actually, they should kind of go hand in hand. This month our customer success spotlights, which span from Europe to Southeast Asia, demonstrate how Red Hat helps customers focus on two critical components of success: helping their people learn new skills and implementing new technology. Let’s see how Red Hat OpenShift and Online Partner Enablement Network have helped customers and partners modernize their environments to keep up with growing market demands.

  • Automating host to host VPN tunnels with RHEL System Roles

    In today's world where organizations frequently use multiple cloud providers, datacenters, and systems in edge environments, secure communication between these distributed systems is essential. Host-to-host VPN tunnels allow for encrypted communication between systems, and are frequently used when traffic needs to traverse untrusted networks such as the public internet. While host-to-host VPN tunnels can be implemented on Red Hat Enterprise Linux (RHEL) manually, this can be time consuming and error-prone. Red Hat introduced the VPN RHEL System Role in RHEL 8.5 to provide an automated solution to implement host-to-host VPN connections, as well as opportunistic mesh VPNs. RHEL System Roles are a collection of Ansible roles and modules that are included in RHEL to help provide consistent workflows and streamline the execution of manual tasks. For more information on VPNs in RHEL, refer to the configuring a VPN with IPsec documentation.

  • Custom WebAssembly extensions in OpenShift Service Mesh

    Red Hat OpenShift Service Mesh 2.1 requires using WebAssembly extensions instead of Istio Mixer to extend Service Mesh functionality. The 2.11 release of Red Hat 3scale API Management also supports using WebAssembly extensions. Thus, the latest release of the 3scale integration for Istio uses the WebAssembly proxy instead of the Istio Mixer component. Developers can use WebAssembly extensions in OpenShift Service Mesh and 3scale to add features directly to the Envoy proxy, thereby moving common functionality out of applications and into the sidecar.

  • Boost Apache Camel performance on Quarkus

    Camel Quarkus is a subproject in the Apache Camel community that enables Camel to run on Quarkus. Apache Camel is the most popular open source community project aimed at solving all things integration. Quarkus is a Java framework tailored for OpenJDK HotSpot and GraalVM, boasting lightning-fast boot times and low memory utilization. This article explains how Camel has evolved over time and why it is now embracing Quarkus. I've included a quick getting started guide that will show you how easy it is to create a Camel Quarkus project and experience the significant performance benefits for yourself.