Language Selection

English French German Italian Portuguese Spanish

Security

Heads up, dear leader: Security hole found in North Korea’s home-grown OS

Filed under
Linux
Security

North Korea is a technological island in many ways. Almost all of the country's "Internet" is run as a private network, with all connections to the greater global Internet through a collection of proxies. And the majority of the people of the Democratic People's Republic of Korea who have access to that network rely on the country's official operating system: a Linux variant called Red Star OS.

Red Star OS, first introduced in 2003, was originally derived from Red Hat Linux. In theory, it gave North Korea an improved level of security against outside attack—a Security Enhanced Linux operating system based on Red Hat that could enforce strict government access controls on the few who got to use it.

Read more

3 REASONS WHY OPEN SOURCE MEANS BETTER SECURITY

Filed under
OSS
Security

By leveraging open source software and establishing best practices to protect this data at an ongoing rate, these agencies can take a cue from the private sector and enjoy a sense of trust in the way they store and collaborate on private data.

Read more

4MRescueKit

Filed under
GNU
Linux
Security

4MRescueKit provides its users with software for antivirus protection, data backup, disk partitioning, and data recovery. It is distributed in the form of a multiboot CD, which includes four (extremely small) operating systems. Each of the systems tries to follow the UNIX philosophy (Small is beautiful. Make each program do one thing well).

Read more

Is SSH Insecure?

Filed under
OSS
Security

Fact is, we don’t yet know enough details about all possible attack surfaces against SSH available to the agencies and we badly need more information to know what infrastructure components remain save and reliable for our day to day work. However we do have an idea about the weak spots that should be avoided.

Read more

Anonabox Gets Kicked from Kickstarter, Shows Up on Indiegogo with Updated Specs

Filed under
GNU
Linux
Security

The online community tore the project apart and discovered that the makers of Anonabox were disingenuous when they were saying that it was something original, custom built. As it turned out, it was actually a repurposed Chinese device with a slightly better memory. Also, the operating system used was OpenWRT, which is basically Linux distro for routers and other such devices. Most, if not all of the information provided on Kickstarter was a lie. Eventually, the Kickstarter project was suspended and no one got hurt, financially.

Read more

Shuttleworth Explains Why Open Source is More Secure than Closed Source [VIDEO]

Filed under
Security
Ubuntu

In 2014, open source technology came under a heavy barrage of criticism as a result of high-profile security vulnerabilities. Mark Shuttleworth, the founder of Ubuntu Linux and its lead commercial sponsor Ubuntu, has a very different view and remains a stalwart defender of the open source model for software development and security.

In a video interview with Datamation, Shuttleworth details his view on open-source security as Ubuntu Linux celebrates its 10th anniversary.

In 2014, the Heartbleed vulnerability in the open source OpenSSL cryptographic library had wide ranging impact. OpenSSL is widely deployed on servers, VPNs and even mobile devices and it took some time for vendors and users to get systems and devices patched.

"We have a big responsibility to proactively make sure that the system is as robust in the face of inevitable flaws as it can be," Shuttleworth said.

Read more

Open Source Privacy Tools NSA Can't Crack: OTR, PGP, RedPhone, Tor And Tails

Filed under
OSS
Security

In a recent talk at the Chaos Communication Congress, Jacob Appelbaum, who is a core member of the Tor Project and is now working with Der Spiegel and Laura Poitras to analyze the Snowden documents, unveiled some documents showing which tools NSA couldn't crack.

Read more

Believe It or Not, Boeing's Super-Secure Android Smartphone Comes With the Best of BlackBerry

Filed under
Android
Security

As it turns out, Boeing might actually be BlackBerry's best friend right now. You see, the ultra-secure Boeing Black handset will come with support for BlackBerry's BES 12 device management service. It's not much of a stretch to assume the Boeing Black might also feature BlackBerry's hallmark secure messaging system.

Read more

Old FOSS Friend & Foe Represents Sony in Hack

Filed under
Microsoft
Security
Legal

Boies, along with three attorneys representing the States, brought Microsoft to it’s knees — or so it seemed at the time.

On November 5, 1999, Judge Thomas Penfield Jackson found that Windows dominance on the PC made the company a monopoly and that the company had taken illegal actions against Apple, Java, Netscape, Lotus Notes, RealNetworks, Linux, and others in order to maintain that monopoly. He ordered Microsoft broken in two, with one company producing Windows and another handling all other Microsoft software.

As we all know, Judge Jackson’s solution was never implemented.

Although an appeals court upheld the verdict against Redmond, the breakup of the company was overturned and sent back to the lower court for a review by a new judge. Two years later, in September, 2001, under the Bush Administration, the DOJ announced that it was no longer seeking the breakup of Microsoft, and in November reached a settlement which California, Connecticut, Iowa, Florida, Kansas, Minnesota, Utah, Virginia and Massachusetts opposed.

The settlement basically required Microsoft to share its APIs and appoint a three person panel that would have complete access to Microsoft’s systems, records, and source code for five years. The settlement didn’t require Microsoft to change any code or stop the company from tying additional software with Windows. Additionally, the DOJ did not require Microsoft to change any of its code.

Read more

You should be running a pfSense firewall

Filed under
Security
BSD

Those of us who work in the depths of high technology are not immune to the age-old adage of the shoemaker’s children having no shoes. We probably have the most technologically advanced homes of anyone we know, but we also tend to leave various items alone if they’re not causing problems. After all, that’s what we deal with at work. Who needs to saddle themselves with network upgrade projects at home when nothing’s broken?

Read more

Syndicate content

More in Tux Machines

Compact IoT gateway runs Yocto Linux on Quark

Advantech is prepping an Intel Quark based IoT gateway that runs Yocto Linux and offers PoE support. mini-PCIe expansion, and web-based device management. Read more

Review: Linux Mint 17.2 Release is Refreshed and Faster

Linux Mint 17.2 "Rafaela" MATE was launched last week and, as usual, I installed it on my machines to see how this distro is progressing. I found a refreshed, faster and more feature-rich distro that's well worth trying. Read more

Samsung to train India’s Telangana youth in Tizen Tech

As part of the spread of Tizen education in India, Samsung will train the youth of the Telangana Academy on innovative digital technologies based on the Tizen operating system. Read more

Jolla cuts hardware biz loose to concentrate on Sailfish licensing

Hardware and software outfit Jolla is to give up making hardware, with that part of the business set to be taken on by a new, yet-to-be-announced company, with Jolla then concentrating on its Sailfish OS. Read more