Language Selection

English French German Italian Portuguese Spanish

Security

Qubes: The Open Source OS Built for Security

Filed under
Linux
Interviews
Security

No matter how good the code review process is, or how high the standards for acceptance, applications will always have bugs, says Joanna Rutkowska, founder and CEO of Invisible Things Lab. So will drivers. And filesystems.

“Nobody, not even Google Security Team, can find and patch all those bugs in all the desktop apps we all use,” Rutkowska says in the Q&A interview, below.

Read more

Open-source project promises easy-to-use encryption for email, instant messaging and more

Filed under
OSS
Security

Called "Pretty Easy Privacy" (PEP), the project's goal is to integrate the technology with existing communication tools on different desktop and mobile platforms. The development team launched a preview PEP implementation Monday for the Microsoft Outlook email client, but plans to build similar products to encrypt communications in Android, iOS, Firefox OS, Thunderbird, Apple Mail, Jabber, IRC (Internet Relay Chat), WhatsApp, Facebook Messenger, Snapchat and Twitter.

Read more

Free Linux Firewall OS IPFire 2.15 Core 82 Has Windows Active-Directory Single Sign-On Web Proxy

Filed under
Android
GNU
Security

Michael Tremer, a developer for the ipfire.org team, has announced that IPFire 2.13 Core 82, a new stable build of the popular Linux-based firewall distribution, is available, bringing quite a few security fixes.

IPFire releases are not usually very big, but this latest update in the series is quite substantial. A number of features and changes have been made and the devs are working to bring even more options to the masses.

Read more

Kolab creates a privacy refugee camp in Switzerland

Filed under
KDE
Security
Web

The disclosure by NSA contractor Edward Snowden has exposed the ‘out-of-control’ surveillance system of the US and the UK. The more stories we are getting from Guardian and NYTimes, the more people are losing trust in the proprietary solutions offered by the companies which operate from the US and seemingly work closely with the spy agencies.

This is a category of people who don’t yet understand the dangers of breach of privacy, but the more we are moving our lives into the digital world, the more important it is becoming to take control of our communication and privacy from the prying hands of those for whom we are the product.

Then there are those need this privacy, due to the profession they are in or for purely sensible reasons that our privacy should be respected.

Read more

Free Software Foundation statement on the new iPhone, Apple Pay, and Apple Watch

Filed under
Security

The Free Software Foundation encourages users to avoid all Apple products, in the interest of their own freedom and the freedom of those around them.

Read more

Why open source and collaboration are the future of security

Filed under
OSS
Security

In this podcast recorded at Black Hat USA 2014, Greg Martin, CTO at ThreatStream, talks about why open source and collaboration are the key drivers of information security innovation. He raises an important question - what will happen if we don't start actively sharing information?

Read more

New ultra secure cell phone, Blackphone, is reportedly flying off the shelves

Filed under
Android
Security

There is, apparently, a big demand for commercially available encrypted smartphones perhaps impervious to the data demands of spy agencies and cyber criminals worldwide.

Indeed, Toby Weir-Jones says sales of his new ultra-encrypted smartphone, called the Blackphone, are flying off the shelves since it began officially shipping in June.

Read more

NBC, Today Show Use Ubuntu to Illustrate Celebrity Hacking Story

Filed under
Security
Ubuntu

Spotting Ubuntu in the wild should be promoted to a sport and records must be set for the most interesting places where the distro has been seen. It looks like NBC and the Today Show have used Ubuntu to illustrate the nefarious practices of the hacker that release some nude pictures of various celebrities.

Read more

Nude photos, phone records, NSA data offer essential lessons for admins

Filed under
Server
Security

As to that NSA data, a great deal of confusion about "surveillance" seems to be floating around. In the United Kingdom, questions are being asked about all the data-gathering by the British equivalent of the NSA, GCHQ. In response, Secretary of State Theresa May has responded that "there is no programme of mass surveillance and there is no surveillance state" and labels claims that GCHQ engages in unlawful hacking as "nonsense." Yet clearly, a lot of data is being gathered.

GCHQ, the NSA, and probably every other intelligence agency worth the name is actively gathering data from the Internet. Everything on the Internet is transient, with different decay periods, so gathering information is a constant process. They believe everything that can be gathered without illegal action is fair game, so they gather anything and everything they can, storing it just in case.

They are without doubt capturing and recording all and any email, instant messages, Web pages, social media traffic, and so on. Recent disclosures reveal that the NSA collects "nearly everything a user does on the Internet," then offers analysts tools to search that data. The NSA has a variety of explanations why it's all legally gathered.

Read more

Firewall detects rogue cell towers that try to intercept your calls

Filed under
Android
Security

Most people know to turn off GPS on their mobiles if they are bothered about being tracked however fewer people know not to leave on Wi-Fi & call service as these also can be used to track you.

A CryptoPhone maker, GSMK, has developed a firewall that tells you if rogue cell towers are trying to connect to your phone. This is the first phone to protects against these attacks but it’s only compatible with one device, a modded Galaxy S3.

Read more

Syndicate content

More in Tux Machines

Leftovers: Gaming

Must Have Android Apps That Aren’t So Well Known

There are must have Android apps that everyone has – the big apps that get all the buzz. There are also apps that win popularity contests in specific groups of people. But there are also Android apps worthy of download that aren’t that well known. Think of them as the “must have” underdog list. To avoid missing out on what may prove to be your most helpful app ever, take a look at these lesser known contenders: Read more

Of course USA loses in cyber war - NSA and friends made sure it would happen

There is a reason why China and others are trying to move away from Windows to Linux and other alternatives, and it is not to avoid sending its hard earned dollars to Cayman Islands (or whatever tax haven Microsoft is using these days to collect the majority of its income. :) Read more

ASF publishes long-overdue Code Of Conduct

We pride ourselves at The Apache Software Foundation on our principles of "community over code" and "don't be a jerk". But, alas, we've been slow to codify some of these things in public. Part of this, I'm sure, is that it’s easy to think we all just know how we're supposed to treat people, and so you shouldn't have to say, right? Read more