Language Selection

English French German Italian Portuguese Spanish

Security

Varnish: SSL revisited

Filed under
Security
BSD

our years ago, I wrote a rant about why Varnish has no SSL support (Why no SSL ?) and the upcoming 4.1 release is good excuse to revisit that issue.

Read more

Old Ubuntu Bug Lets Malicious Users Gain Sudo Access

Filed under
Security
Ubuntu

It appears that there's a bug in Ubuntu distributions which lets malicious users locally exploit sudo and gain access to the user's account without knowing their password. The bug was submitted to Canonical's Launchpad back in September 2013 by user Mark Smith.

Read more

Tor Browser 4.5 is released

Filed under
OSS
Security

The Tor Browser Team is proud to announce the first stable release in the 4.5 series. This release is available from the Tor Browser Project page and also from our distribution directory.
The 4.5 series provides significant usability, security, and privacy enhancements over the 4.0 series. Because these changes are significant, we will be delaying the automatic update of 4.0 users to the 4.5 series for one week.

Read more

Can funding open source bug bounties save Europe from mass-surveillance?

Filed under
OSS
Security

The report also suggests promoting open-source software as a way to build resilience to surveillance, which could be achieved by funding audits of important open-source software. Among several products it highlights is disk encryption software, TrueCrypt, which was recently subjected to a crowd-funded audit that was able to rule out the existence of NSA backdoors in the product.

“TrueCrypt is a typical example of a problem of the commons: worldwide use of software package was probably dependent on two or three developers,” the study notes to highlight why funding open source projects may be valuable.

Read more

LibreOffice Vulnerabilities Closed in Ubuntu 14.10, Ubuntu 14.04, and Ubuntu 12.04

Filed under
LibO
Security
Ubuntu

Canonical revealed details about a number of LibreOffice vulnerabilities that have been found and fixed in Ubuntu 14.10, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS, which also upgrades the office suite.

Read more

The Turing Phone Is Super Durable and Ultra Secure

Filed under
Android
Security

The device also sports a 13MP/8MP camera combo, 64GB / 128GB of internal storage and runs Android 5.0 Lollipop out of the box.

Read more

European Union Should Finance Key Open Source Projects, Says "Mass Surveillance" Study

Filed under
OSS
Security

According to a new study that was discussed today, April 23, in a committee meeting at the European Parliament in Brussels, a group of IT security experts think that the European Union should finance key open source projects that strengthen privacy and security, and configure certification schemes for fundamental open source tools.

Read more

Qubes 3.0-rc1 ISO and roadmap for 2015

Filed under
GNU
Linux
Security

Finally, we're releasing the first installable ISO for Qubes 3.0, the Release Candidate 1 (3.0-rc1)!

Read more

IPFire 2.17 Core 89 Linux Firewall Distribution Brings Numerous Improvements

Filed under
Linux
Security

On April 21, Michael Tremer announced that a new maintenance release for IPFire, a Linux distribution that can be used by beginning and experienced system administrators alike to deploy a firewall, proxy server, or VPN gateway on their infrastructure without too much hassle, is available for download.

Read more

Drupageddon: SQL Injection, Database Abstraction and Hundreds of Thousands of Web Sites

Filed under
Drupal
Security

On October 29, 2014, the Drupal Security Team released advisory identifier DRUPAL-PSA-2014-003. This advisory informed administrators of Drupal-based Web sites that all Drupal-based Web sites utilizing vulnerable versions of Drupal should be considered compromised if they were not patched/upgraded before 2300 UTC on October 15, 2014 (seven hours following the initial announcement of the vulnerability in SA-CORE-2014-005).

In the case of the Drupageddon vulnerability, the database abstraction layer provided by Drupal included a function called expandArguments that was used in order to expand arrays that provide arguments to SQL queries utilized in supporting the Drupal installation. Due to the way this function was written, supplying an array with keys (rather than an array with no keys) as input to the function could be used in order to perform an SQL injection attack.

Read more

Syndicate content

More in Tux Machines

Leftovers: Ubuntu

today's howtos

Leftovers: Gaming

Fedora: The Latest