Language Selection

English French German Italian Portuguese Spanish

Security Leftovers

Filed under
Security
  • The Downside of Linux Popularity

    Popularity is becoming a two-edged sword for Linux.

    The open source operating system has become a key component of the Internet's infrastructure, and it's also the foundation for the world's largest mobile OS, Google's Android.

    Widespread use of the OS, though, has attracted the attention of hackers looking to transfer the dirty tricks previously aimed at Windows to Linux.

    Last year, for example, ransomware purveyors targeted Linux. Granted, it wasn't a very virulent strain of ransomware, but more potent versions likely will be on the way.

  • Baidu Browser Acts like a Mildly Tempered Infostealer Virus

    The Baidu Web browser for Windows and Android exhibits behavior that could easily allow a security researcher to categorize it as an infostealer virus because it collects information on its users and then sends it to Baidu's home servers.

  • Malware déjà vu - why we're still falling for the same old threats

    In second place was Conficker - first discovered in 2008 - which again allows remote control and malware downloads. Together, these two families were responsible for nearly 40% of all malware attacks detected in 2015.

  • Conficker, AndroRAT Continue Malware Reigns of Terror

    Conficker meanwhile continued in its position as King of the Worms, remaining the most prevalent malware type and accounting for 25% of all known attacks during the period. Conficker is popular with criminals thanks to its focus on disabling security services to create more vulnerabilities in the network, enabling them to be compromised further and used for launching DDoS and spam attacks.

  • Child-Monitoring Company Responds To Notification Of Security Breach By Publicly Disparaging Researcher Who Reported It

    "Thanks for letting us know about this! We'll get it fixed immediately!" said almost no company ever.

    There's a long, but definitely not proud, tradition of companies shooting the messenger when informed of security flaws or possible breaches. The tradition continues.

    uKnowKids is monitoring software parents can install on their children's cell phones that allows them to track their child's location, as well as social media activity, text messages and created media. As such, it collects quite a bit of info.

More in Tux Machines

Use BespokeSynth on Fedora Linux

Sun Aug 14 10:36:37 2016, this is the birth date of BespokeSynth. Since that date, BespokeSynth has grown a lot; both in terms of its user base and the size of its codebase. BespokeSynth is an application for performing modular synthesis. Because it has been written by a newcomer to modular synthesis, it is quite different from the usual modular synthesizer. Note: I am the manager of the LinuxMAO / Audinux Copr repository. Read more

IBM/Red Hat Leftovers

  • Writing and unit testing a Python application to query the RPM database | Enable Sysadmin

    When installing software on a Linux system, your package manager keeps track of what's installed, what it's dependent upon, what it provides, and much more. The usual way to look at that metadata is through your package manager. In the case of Fedora or Red Hat Enterprise Linux, it is the RPM database. The RPM database can be queried from the command line with the rpm command, which supports some very nice formatting options. For example, to get a list of all packages sorted by size, I can use a little bit of Bash glue to do the following:

  • How DevSecOps brings security into the development process

    DevSecOps is an extension of DevOps that emphasizes security automation and cooperation across the organization. More than just hype, DevSecOps is a crucial addition to your organization's development and deployment processes, especially given the range of ransomware groups, industrial spies, identity thieves, and other attackers plaguing today's cyberworld. In this article, you will learn how DevSecOps extends familiar DevOps tools and processes to help cross-functional teams work together on the design and implementation of security policies and procedures.

  • Kubernetes and OpenShift: The best of 2021

    2021 was a big year in the world of Kubernetes and Red Hat OpenShift, and over the past twelve months, we have aimed to provide content that will satisfy developer curiosity on how to best use these platforms, from info on the big release of OpenShift 4.8 to tutorials on deploying Helm charts and working with OpenShift Serverless Functions. Keep reading for these highlights and more.

  • Quarkus, containers, and Java: Tune in to Jconf.dev 2021

    The Jconf.dev community Java conference is going virtual for 2021, which means that developers worldwide will be able to stream sessions of interest wherever they are. The conference is on December 9, and a number of Red Hatters are presenting material that will be of interest to the developer community. Read on to learn more and find out when to tune in.

  • Our top 5 Harvard Business Review articles of 2021

    Each month, through our partnership with Harvard Business Review, we share five new HBR articles we believe CIOs and IT leaders will value highly. As 2021 comes to a close, we are taking a look back at the five most popular HBR articles from this past year. Here are the stories that resonated with you.

Julia 1.7 Released

  • Julia 1.7 Highlights

    Jeff Bezanson, Jameson Nash, Ian Butterworth, Kristoffer Carlsson, Shuhei Kadowaki, Elliot Saba, Viral B Shah, Mosè Giordano, Simeon Schaub, Nicholas Bauer, Keno Fischer After 4 betas and 3 release candidates, Julia version 1.7 has finally been released. We would like to thank all the contributors to this release (more than 79 people) and all the testers that helped with finding regressions and issues in the pre-releases. Without you, this release would not have been possible. The full list of changes can be found in the NEWS file, but here we'll give a more in-depth overview of some of the release highlights.

  • Julia 1.7 Released With Improved Threading Capabilities - Phoronix

    Version 1.7 of the Julia programming language implementation is now available, the open-source high-performance language that is general purpose but especially popular for computational science and numerical analysis. The Julia programming language is increasingly used for numerical computing/analysis use-cases and by all accounts remains on a terrific upward trajectory. Julia 1.7 is the latest feature release adding on new features and functionality.

LibreOffice 7.3 Beta1 is available for testing

The LibreOffice Quality Assurance ( QA ) Team is happy to announce LibreOffice 7.3 Beta1 is available for testing! LibreOffice 7.3 will be released as final at the beginning of February, 2022 ( Check the Release Plan for more information ) being LibreOffice 7.3 Beta1 the second pre-release since the development of version 7.3 started in mid June, 2021. Since the previous release, LibreOffice 7.3 Alpha1, 1199 commits have been submitted to the code repository and 205 issues got fixed. Check the release notes to find the new features included in this version of LibreOffice. Read more