Security Leftovers
-
Long-Term Consequences Of Spectre And Its Mitigations
-
Ubuntu 17.04 (Zesty Zapus) reached End of Life on January 13, 2018
-
Using BitTorrent For Downloading? This Security Flaw Lets Hackers Control Your PC Remotely [Ed: Dan Goodin, sued for his sensationalism, is now cited by many equally sensationalist reports/blogs]
Even though the popularity of streaming websites is rising at a fast pace, BitTorrent remains a premier source of entertainment content source for a large chunk of people using the web. With the help of tons of popular torrent sites (there are some completely legal ones as well) and BitTorrent clients, people download content.
-
BitTorrent Client Transmission Suffers Remote Takeover Vulnerability
Transmission, one of the most used non-commercial BitTorrent clients, has a vulnerability that allows outsiders to gain control over people's computers. The flaw affects users who have remote control enabled with the default password. The vulnerability was revealed by a Google researcher, who plans to disclose similar remote code execution flaws in other torrent clients as well.
-
Researchers identify Android malware that can 'spy extensively'
Researchers at the Moscow-based cybersecurity firm described the spyware, named Skygofree, as a sophisticated mobile implant “designed for targeted cyber-surveillance” that can be potentially used as an “offensive security” product.
-
DHS giving ‘active defense’ cyber tools to private sector, secretary says
Nielsen did not go into detail about the active defense measures that the Homeland Security Department is supporting in the private sector.
-
Hospital hit by ransomware: Attackers demand Bitcoin to release control of system
-
Coercion – a problem larger than authentication
Authentication is not the place where coercion can be mitigated — locking the Facebook account of an arrested dissident is more important than a “duress finger” option for a phone. Allowing organisations to securely compartment access to data, and remotely wipe a seized device, is more important than the limitations of FaceID.
- Login or register to post comments
- Printer-friendly version
- 1833 reads
- PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
digiKam 7.7.0 is releasedAfter three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. |
Dilution and Misuse of the "Linux" Brand
|
Samsung, Red Hat to Work on Linux Drivers for Future TechThe metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. |
today's howtos
|
Recent comments
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago