Language Selection

English French German Italian Portuguese Spanish

Security

Ubuntu 16.04 LTS Users Get New Kernel Live Update, 14 Vulnerabilities Patched

Filed under
Security
Ubuntu

If you're using Canonical's kernel live patch update system for rebootless Linux kernel updates, Benjamin M. Romer is informing users about the availability of a major patch.

Read more

Security Leftovers

Filed under
Security
  • Using Microsegmentation to Prevent Security Breaches

    No one likes to admit it but most of what has passed for IT security in the enterprise has historically been rudimentary at best. Most organizations physically segmented their networks behind a series of firewalls deployed at the edge of the network. The trouble is that once malware gets past the firewall it could move laterally almost anywhere in the data center.

    With the rise of network virtualization, a new approach to microsegmenting networks is now possible. The new approach involves using microsegmenting to prevent malware from laterally generating East-West traffic across the data center. Instead of a physical instance of a firewall, there is now a virtual instance of a firewall that is simpler to provision and update.

  • Latest Exploit Dump By Shadow Brokers Contains Easy-To-Use Windows Exploits, Most Already Patched By Microsoft [Ed: Sad to see TechDirt repeating Microsoft's lies in the same way many ‘journalists’ repeated Apple lies after Vault 7 revelations. Some of the holes remain unpatched, and some versions (still under support) will always remain unpatched.]

    Not that those with the latest and greatest should rest easy. The NSA hasn't stopped producing and purchasing exploits. The SB stash was a few years old. Current Microsoft software remains under attack from state intelligence agencies and criminals. But this dump of tools shows just how powerful the NSA's toolkit is -- one made even more dangerous by its apparent ease of use. It makes exploit delivery possible for anyone, not just those with a very specific skillset.

  • Leaked NSA exploits plant a bull's-eye on Windows Server

    Friday’s release of suspected NSA spying tools is bad news for companies running Windows Server. The cyberweapons, which are now publicly available, can easily hack older versions of the OS.

    The Shadow Brokers, a mysterious hacking group, leaked the files online, setting off worries that cybercriminals will incorporate them in their own hacks.

  • The YARA tool for Linux security - part 001.
  • Twistlock 2.0 Improves Container Security and Compliance

    Container security vendor Twistlock is updating its namesake platform with a 2.0 release that aims to help improve container visibility and security.

    Twistlock first debuted its container security platform in November 2015, providing runtime security options for container deployments. The platform has evolved since then with a steady stream of updates. The new Twistlock 2.0 update, includes several enhanced container security capabilities as well as a new backend code infrastructure.

In Defence of Dmitry Bogatov

Filed under
Security
Debian
  • Statement concerning the arrest of Dmitry Bogatov

    The Debian Project is concerned to hear that one of our members, Dmitry Bogatov, has been arrested by Russian authorities.

    Dmitry is a mathematics teacher, and an active Debian contributor. As a Debian Maintainer, he worked in the Debian Haskell group and currently maintains several packages for command line and system tools.

  • Statement regarding Dmitry Bogatov

    What we know right now is that serious accusations of wrongdoing have been made against a valued member of our community, a person who has, among other things, been a Tor relay operator, Debian Developer, GNU developer, and privacy activist. We are collecting facts, monitoring the situation closely, and sharing information with allied organizations and individuals.

  • Debian Issues Statement Over Arrested Russian Developer

    Debian developer Dmitry Bogatov was arrested by Russian authorities for running a Tor exit node and accused of supporting terrorism.

Security Leftovers and Fixes

Filed under
Security

Security and Microsoft Back/Bug Doors

Filed under
Microsoft
Security
  • Security updates for Friday
  • careful with the chrome HSTS

    I mean, yes, I set the HSTS header, but that was with the same cert that chrome is now insisting can’t be trusted. Why in the world would you permanently store “must have trusted cert” on the basis of an untrusted cert?

  • Hacked NSA tools put Windows users at possible risk

    The hacking group known as Shadow Brokers claims to have released National Security Agency malware designed to break into Windows computers. The software could make millions of Microsoft users vulnerable to malicious parties.

    [...]

    The NSA didn't immediately respond to a request for comment. But this isn't the first US intelligence agency whose tools have been leaked to the public. Just last month, WikiLeaks released techniques it claimed the CIA used for breaking into phones, computers, cars and smart TVs.

  • Leaked NSA point-and-pwn hack tools menace Win2k to Windows 8

    The Shadow Brokers have leaked more hacking tools stolen from the NSA's Equation Group – this time four-year-old exploits that attempt to hijack venerable Windows systems, from Windows 2000 up to Server 2012 and Windows 7 and 8.

    The toolkit puts into anyone's hands – from moronic script kiddies to hardened crims – highly classified nation-state-level weaponry that can potentially compromise and commandeer systems around the world. This is the same powerful toolkit Uncle Sam used once upon a time to hack into and secretly snoop on foreign governments, telcos, banks, and other organizations.

  • Microsoft blocks Kaby Lake and Ryzen PCs from Windows 7, 8 updates

    That means all updates, including security updates, will be unavailable on PCs with brand new hardware running the two older operating systems.

  • Microsoft says U.S. foreign intelligence surveillance requests more than doubled

    Microsoft said it received between 1,000 and 1,499 FISA orders for user content between January and June of 2016, compared to between 0 and 499 during both January-June 2015 as well as the second half of 2015.> Microsoft Corp (MSFT.O) said on Thursday it had received at least a thousand surveillance requests from the U.S. government that sought user content for foreign intelligence purposes during the first half of 2016.

Capsule8 Building Container-Aware Security Platform for Linux

Filed under
Linux
Security

Security startup Capsule8 emerged from its stealth mode in February with a plan to help provide a new model for application container security. In a video interview with eWEEK, Capsule8 CTO Dino Dai Zovi and CEO John Viega explain what's missing from container security today and what they are building to help fill the gap.

"Capsule8 is container-aware, real-time threat protection for Linux-based production environments," Dai Zovi said.

Dai Zovi explained that the company name Capsule8 is a pun on what it does—which is encapsulates security knowledge in software, providing a secure approach to application delivery and deployment.

Read more

An Important Linux Kernel Security Patch Is Available for CentOS 7, Update Now

Filed under
Linux
Red Hat
Security

CentOS maintainer Johnny Hughes has informed the community about the availability of yet another important kernel security update, this time for users of the CentOS Linux 7 operating system series.

Read more

Big Linux bug, low security concerns

Filed under
Linux
Security

This Linux/Android bug sure sounded bad.

The National Institute of Standards and Technology (NIST) and Symantec announced a LinuxKernel ipv4/udp.c bug that made the LinuxKernel 4.4 and earlier vulnerable to remote code-execution. In turn, an attacker could exploit this issue to execute arbitrary code. Worse still, even failed exploits might cause denial-of-service attacks.

There's only one problem with this analysis and the resulting uproar: It's wrong.

Yes, the bug existed. NIST described it as a "critical" bug, and its description makes it sound like it can open Linux and Android-powered devices to attacks via UDP network traffic. The important phrase is "sound like."

Read more

Long Term Support and Security

Filed under
Security
  • Freexian’s report about Debian Long Term Support, March 2017

    Like each month, here comes a report about the work of paid contributors to Debian LTS.

  • Unpatched vulnerability exposes Magento online shops to hacking

    An unpatched vulnerability in the Magento e-commerce platform could allow hackers to upload and execute malicious code on web servers that host online shops.

    The flaw was discovered by researchers from security consultancy DefenseCode and is located in a feature that retrieves preview images for videos hosted on Vimeo. Such videos can be added to product listings in Magento.

    The DefenseCode researchers determined that if the image URL points to a different file, for example a PHP script, Magento will download the file in order to validate it. If the file is not an image, the platform will return a "Disallowed file type" error, but won't actually remove it from the server.

  • NSA's arsenal of Windows hacking tools have leaked

    A new trove of alleged surveillance tools and exploits from the National Security Agency's elite hacking team have been released by the Shadow Brokers' hacking group.

    The group Friday appeared to release tools designed to target Windows PCs and servers, along with presentations and files purporting to detail the agency's methods of carrying out clandestine surveillance.

Security Leftovers

Filed under
Security
Syndicate content

More in Tux Machines

Android Leftovers

The Licensing and Compliance Lab interviews AJ Jordon of gplenforced.org

So basically Bradley Kuhn gave a talk at FOSDEM '17 about GPL enforcement and I was like, wow, it sucks how many companies and people think that enforcing the GPL is a bad idea. I mean, if you disagree with copyleft that's fine (though I personally would argue with that position), but then you should use a suitable license. Like MIT. The very idea that we shouldn't enforce the GPL just doesn't make sense to me because it suggests that the text of the license is watery and unimportant. I don't know about you, but when I say I want my programs to respect users' freedom, I mean it. So GPL enforcement is important. It seemed to me that there are probably a lot of developers out there who want to support GPL enforcement but don't have a good way to voice that support. gplenforced.org is essentially a quick and dirty hack I wrote to make that dead-simple. Read more

Red Hat General and Financial News

today's howtos