Language Selection

English French German Italian Portuguese Spanish

Security

Free Software Foundation statement on the new iPhone, Apple Pay, and Apple Watch

Filed under
Security

The Free Software Foundation encourages users to avoid all Apple products, in the interest of their own freedom and the freedom of those around them.

Read more

Why open source and collaboration are the future of security

Filed under
OSS
Security

In this podcast recorded at Black Hat USA 2014, Greg Martin, CTO at ThreatStream, talks about why open source and collaboration are the key drivers of information security innovation. He raises an important question - what will happen if we don't start actively sharing information?

Read more

New ultra secure cell phone, Blackphone, is reportedly flying off the shelves

Filed under
Android
Security

There is, apparently, a big demand for commercially available encrypted smartphones perhaps impervious to the data demands of spy agencies and cyber criminals worldwide.

Indeed, Toby Weir-Jones says sales of his new ultra-encrypted smartphone, called the Blackphone, are flying off the shelves since it began officially shipping in June.

Read more

NBC, Today Show Use Ubuntu to Illustrate Celebrity Hacking Story

Filed under
Security
Ubuntu

Spotting Ubuntu in the wild should be promoted to a sport and records must be set for the most interesting places where the distro has been seen. It looks like NBC and the Today Show have used Ubuntu to illustrate the nefarious practices of the hacker that release some nude pictures of various celebrities.

Read more

Nude photos, phone records, NSA data offer essential lessons for admins

Filed under
Server
Security

As to that NSA data, a great deal of confusion about "surveillance" seems to be floating around. In the United Kingdom, questions are being asked about all the data-gathering by the British equivalent of the NSA, GCHQ. In response, Secretary of State Theresa May has responded that "there is no programme of mass surveillance and there is no surveillance state" and labels claims that GCHQ engages in unlawful hacking as "nonsense." Yet clearly, a lot of data is being gathered.

GCHQ, the NSA, and probably every other intelligence agency worth the name is actively gathering data from the Internet. Everything on the Internet is transient, with different decay periods, so gathering information is a constant process. They believe everything that can be gathered without illegal action is fair game, so they gather anything and everything they can, storing it just in case.

They are without doubt capturing and recording all and any email, instant messages, Web pages, social media traffic, and so on. Recent disclosures reveal that the NSA collects "nearly everything a user does on the Internet," then offers analysts tools to search that data. The NSA has a variety of explanations why it's all legally gathered.

Read more

Firewall detects rogue cell towers that try to intercept your calls

Filed under
Android
Security

Most people know to turn off GPS on their mobiles if they are bothered about being tracked however fewer people know not to leave on Wi-Fi & call service as these also can be used to track you.

A CryptoPhone maker, GSMK, has developed a firewall that tells you if rogue cell towers are trying to connect to your phone. This is the first phone to protects against these attacks but it’s only compatible with one device, a modded Galaxy S3.

Read more

HardenedBSD: The Latest BSD Project That Aims To Boost Security

Filed under
Security
BSD

HardenedBSD is the latest BSD distribution writing into Phoronix to share its work.

HardenedBSD isn't some radical new BSD operating system but rather it's working on being a security-enhanced version of FreeBSD. HardenedBSD is just about providing security enhancements on top of the FreeBSD code-base. This initiative just started this summer by Oliver Pinter and Shawn Webb.

Read more

Out in the Open: Take Back Your Privacy With This Open Source WhatsApp

Filed under
OSS
Security

Private messaging apps like SnapChat and WhatsApp aren’t as private as you might think.

SnapChat settled with the Federal Trade Commission earlier this month over a complaint that its privacy claims were misleading, as reported by USA Today, and last week, the Electronic Frontier Foundation published a report listing the company as the least privacy-friendly tech outfit it reviewed, including Comcast, Facebook, and Google. Last year, WhatsApp faced privacy complaints from the Canadian and Dutch governments, and like Snapchat, its security has been an issue as well.

Read more

Bringing new security features to Docker

Filed under
Red Hat
Server
Security

In the first of this series on Docker security, I wrote "containers do not contain." In this second article, I'll cover why and what we're doing about it.

Docker, Red Hat, and the open source community are working together to make Docker more secure. When I look at security containers, I am looking to protect the host from the processes within the container, and I'm also looking to protect containers from each other. With Docker we are using the layered security approach, which is "the practice of combining multiple mitigating security controls to protect resources and data."

Basically, we want to put in as many security barriers as possible to prevent a break out. If a privileged process can break out of one containment mechanism, we want to block them with the next. With Docker, we want to take advantage of as many security mechanisms of Linux as possible.

Luckily, with Red Hat Enterprise Linux (RHEL) 7, we get a plethora of security features.

Read more

Open source needs more than the Open Crypto Audit Project

Filed under
OSS
Security

But open source tends to be something of an agglomeration of programmers -- some brilliant, some boneheaded -- around a core developer or two. I think it just might be possible to influence the small group of programmers at the core of each open source project to create a culture that develops secure code. In fact, in some ways it might even be easier to do with open source projects because they, for the most part, don't face the arbitrary deadlines of the commercial world.

Read more

Syndicate content

More in Tux Machines

Arch Linux 2015.03.01 Is Now Available for Download

A brand-new ISO image of the lightweight, highly customizable and powerful Arch Linux computer operating system has been released today, March 1, 2015, for those who want to deploy the acclaimed distribution on new computers. Read more

Cuberox, App-Driven Linux-Based Cube, Has Six Touch Screens

Vancouver-based startup Cuberox launched a new Kickstarter campaign on Tuesday to raise funds for a Linux-based cube of the same name. This gadget sports a touch-enabled screen on each side and is capable of running six apps simultaneously. The campaign is shooting to acquire $150,000 in funding before the March 29, 2015 deadline. Read more

Rancher Labs builds Linux system for Docker

As Docker continues to gain popularity, more and more minimalist operating systems are emerging to run the platform in production and at scale. Rancher Labs recently announced a new open-source operating system designed explicitly for Docker. While Docker is able run on almost any Linux distribution, RancherOS was conceptualized out of the company’s own needs, according to Sheng Liang, founder and CEO of Rancher Labs. Read more

The state of Linux gaming in the SteamOS era

For decades after Linux's early '90s debut, even the hardest of hardcore boosters for the open source operating system had to admit that it couldn't really compete in one important area of software: gaming. "Back in around 2010 you only had two choices for gaming on Linux," Che Dean, editor of Linux gaming news site Rootgamer recalls. "Play the few open source titles, Super Tux Kart and so on, or use WINE to play your Windows titles." Read more