Language Selection

English French German Italian Portuguese Spanish

Security

Linux Kernel 3.10.105 LTS Is Out with Almost 300 Improvements, Security Fixes

Filed under
Linux
Security

Linux kernel maintainer Willy Tarreau was proud to announce today the availability of a new maintenance update for the long-term supported Linux 3.10 kernel series, version 3.10.105.

Read more

Five New Linux Kernel Vulnerabilities Patched in Ubuntu 16.10 for Raspberry Pi 2

Filed under
Linux
Security
Ubuntu

Canonical announced a few hours ago the availability of a new security update for the Raspberry Pi 2 kernel packages of the Ubuntu 16.10 (Yakkety Yak) operating system, which patches a total of five newly discovered vulnerabilities.

Read more

Security Leftovers

Filed under
Security

KDE Applications 16.12.2 Rolls Out for Plasma Users to Fix over 20 Recorded Bugs

Filed under
KDE
Security

Today, February 9, 2017, KDE has had the great pleasure of announcing the general availability of the second point release of its KDE Applications 16.12 software suite for KDE Plasma desktops.

Read more

Security Leftovers

Filed under
Security
  • Thousands of WordPress websites defaced through patch failures

    Thousands of WordPress domains have been subject to attack through a severe content injection security flaw that many website operators have failed to protect themselves against.

    The security flaw, a zero-day vulnerability that affects the WordPress REST API, allows attackers to modify the content of posts or pages within a website backed by the WordPress content management system (CMS).

    As noted by cybersecurity firm Sucuri, one of the REST endpoints allows access via the API to view, edit, delete, and create posts.

  • Introducing Capsule8: Industry's First Container-Aware, Real-time Threat Protection for Linux

    "The cloud has catapulted Linux to the most popular platform on the planet, and now the use of container technology is exploding. Yet there has been no world-class commercial security offering focused on securing the Linux infrastructure until now," said Bob Goodman, partner at Bessemer. "Capsule8 is solving the difficult problem of providing zero-day threat protection for Linux, whether legacy, container or something in-between. Simply put, John, Dino and Brandon are pioneering the most comprehensive and effective security protection ever offered for Linux."

  • Container-Aware Security Startup Capsule8 Emerges from Stealth

    Capsule8, a Brooklyn, NY-based security startup, emerged from stealth today to debut its container-aware threat protection platform for Linux.

Security Leftovers

Filed under
Security

FOSS CMS News

Filed under
OSS
Security
  • Migrated blog from WordPress to Hugo

    My WordPress blog got hacked two days ago and now twice today. This morning I purged MySQL and restored a good backup from three days ago, changed all DB and WordPress passwords (both the old and new ones were long and autogenerated ones), but not even an hour after the redeploy the hack was back. (It can still be seen on Planet Debian and Planet Ubuntu. Neither the Apache logs nor the Journal had anything obvious, nor were there any new files in global or user www directories, so I’m a bit stumped how this happened. Certainly not due to bruteforcing a password, that would both have shown in the logs and also have triggered ban2fail, so this looks like an actual vulnerability.

  • WordPress 4.7.2

    When WordPress originally announced their latest security update, there were three security fixes. While all security updates can be serious, they didn’t seem too bad. Shortly after, they updated their announcement with a fourth and more serious security problem.

    I have looked after the Debian WordPress package for a while. This is the first time I have heard people actually having their sites hacked almost as soon as this vulnerability was announced.

  • 4 open source tools for doing online surveys

    Ah, the venerable survey. It can be a fast, simple, cheap, and effective way gather the opinions of friends, family, classmates, co-workers, customers, readers, and others.

    Millions turn to proprietary tools like SurveyGizmo, Polldaddy, SurveyMonkey, or even Google Forms to set up their surveys. But if you want more control, not just over the application but also the data you collect, then you'll want to go open source.

    Let's take a look at four open source survey tools that can suit your needs, no matter how simple or complex those needs are.

Security Leftovers

Filed under
Security

Security News

Filed under
Security
  • Lynis – Security Auditing and Hardening Tool for Linux/Unix Systems

    First i want to tell you about system security before going deeper about Lynis. Every system administrator should know/understand about system security, Hardening, etc,. So that we can make our system up and running smoothly without any issues otherwise we have to face so many issues.

  • Security Hygiene for Software Professionals

    As software makers, we face a unique threat model. The computers or accounts we use to develop and deliver software are of more value to an attacker than what ordinary computer users have—cloud service keys can be stolen and used for profit, and the software we ship can be loaded with malware without our knowledge. And that’s before we consider that the code we write has a tremendous value of its own and should be protected.

  • AI isn't just for the good guys anymore

    Last summer at the Black Hat cybersecurity conference, the DARPA Cyber Grand Challenge pitted automated systems against one another, trying to find weaknesses in the others' code and exploit them.

    "This is a great example of how easily machines can find and exploit new vulnerabilities, something we'll likely see increase and become more sophisticated over time," said David Gibson, vice president of strategy and market development at Varonis Systems.

    His company hasn't seen any examples of hackers leveraging artificial intelligence technology or machine learning, but nobody adopts new technologies faster than the sin and hacking industries, he said.

    "So it's safe to assume that hackers are already using AI for their evil purposes," he said.

  • MongoDB And Open Source: Super-Sized Vulnerability? [Ed: TopSpin Security is spinning and lying. MongoDB didn’t have a vulnerability, it was the fault of bad setup.]

OpenSUSE Web Site Cracked, Tumbleweed Update

Filed under
Security
Web
SUSE
Syndicate content

More in Tux Machines

Red Hat News

Leftovers: Ubuntu

Linux Devices

  • AsteroidOS 1.0 Alpha on the Asus Zenwatch 3
    In a previous article, I published a small userspace image and Linux kernel for the Zenwatch 3 that enables root access with SSH over USB on the watch. By now, I reached my initial goal to get AsteroidOS, the alternative Android Wear operating system, running on the Zenwatch 3. Similar to SailfishOS and Ubuntu Touch, AsteroidOS uses the original Android kernel - a patched Linux kernel - with a GNU/Linux userspace that, in turn, also uses some of the original, closed-source Android libraries to access certain hardware like the GPU. As the Android libraries expect a different software ecosystem, e.g., a different C library called bionic, we cannot simply call the Android libraries from within a common GNU/Linux application. Instead, we need an additional software layer that translates between the Android and the common GNU/Linux world. This layer is called libhybris.
  • How Ironic: Harman Kardon’s Microsoft Cortana Speaker Is Powered by Linux
    Harman Kardon, the company recently acquired by Samsung, has developed its very own Cortana speaker, which is very similar to the Amazon Echo but featuring Microsoft’s famous digital assistant. And since Cortana is the key feature of this little device, it only makes sense for Harman Kardon to turn to Windows 10 to power the device. And yet, it looks like the so-called Harman Kardon is actually running Linux.
  • MontaVista® Launches Carrier Grade eXpress®(CGX) 2.2 Linux® for 5G and IoT at MWC 2017
  • The Numbers Article for Mobile in 2017 - All the Statistics You Could Ask For
    Mobile is the hottest industry. Banking and payments are rushing to mobile. Governments doing healthcare and education with mobile. Travel from airlines to taxis to trains and busses to hotel bookings is going mobile. Your driver's licence is migrating to the mobile phone as are your keys to your home. And all the other big tech stories from Internet of Things (IoT) to 'Big Data' analytics to Cloud computing - are all dependent on mobile. And next week we have the massive industry event in Barcelona, Mobile World Congress. My brand new TomiAhonen Almanac 2017 is now finished and is released today. So this is the perfect time to do my annual 'State of Mobile' blog of the major statistics. What are the big numbers. Lets start with reach. Yes, mobile is by far the most widely-spread communication technology humankind has ever witnessed.
  • Tizen Store Expands Its Service Coverage to 222 Countries
    The Tizen Store, as the name suggests, is the Tizen Application Store for developers to publish their free and paid for Tizen apps. In April 2015, we saw the store expand it’s coverage to include 182 countries, which was mainly for FREE apps, but we saw this as setting the foundation for providing paid for apps further down the road.

Android Leftovers