Language Selection

English French German Italian Portuguese Spanish

Security

Dutch government to shore up open source security

Filed under
OSS
Security

The Dutch Parliament on Tuesday approved a EUR 0.5 million budget to develop and improve existing open source encryption solutions that are a crucial part of the Internet. The plan is to enhance projects such as OpenSSL, LibreSSL or PolarSSL (mbed TLS).

Read more

Security Leftovers

Filed under
Security
  • Symantec: iOS and OS X users face a surge of fresh security threats

    SECURITY FIRM Symantec has warned that the hacker threat to Apple users has reached unprecedented levels.

    The firm reckons that Apple is a victim of its success, becoming a bigger target as its user base grows. To be fair to Apple most of the problem relates to jailbroken devices, which is not a thing that the firm recommends. We have seen incidents recently that make the most of this. The threat applies to mobile software and the desktop.

  • DoS attack brings UK universities to a virtual standstill

    According to the Telegraph newspaper, universities across the country have been hit by DoS attacks. This means in some cases no internet access, and that means students will have to study like it's 1980 something.

  • U.K. Cops Are Trying to Scare Teen Hackers With House Calls

    It was a summer morning, officer Paul Hastings recalls, when he arrived at a suspected hacker’s house in the northern English city of Hull. There, police had tracked one of the people who’d signed up online for a hacking service called Lizard Stresser that was used to attack companies including Microsoft, Amazon.com, and Sony at the end of 2014. This particularly fearsome cybervigilante was asleep when Hastings knocked, so his dad answered the door.

    The visit was one of about 50 U.K. police made this year to people they say used the Lizard Stresser site, many of them children. The Hull suspect, a teenager, couldn’t have done anything wrong, his dad told Hastings. He spent all his time upstairs, on his computer.

    [...]

    Teen hackers have been pop culture figures since Matthew Broderick starred in WarGames, and the U.K. has a long history with juvenile black hats. In 1994, when U.S. Air Force researchers found an unauthorized user on their systems downloading data, they tracked the hacker to a North London suburb. Working with London police, they found their culprit: a 16-year-old boy in an attic bedroom, as journalist Gordon Corera recounts in Intercept: The Secret History of Computers and Spies.

Open source encryption? Now Netherlands votes to help fund security projects

Filed under
OSS
Security

In what some might see as swimming against the political mainstream, the Netherlands parliament has just decided to back open-source web security with hard cash.

Read more

Security Leftovers

Filed under
Security

Security Leftovers

Filed under
Security

Security Leftovers

Filed under
Security

Security More Leftovers

Filed under
Security

Security Leftovers

Filed under
Security
  • Elasticsearch Servers Targeted by Linux-Based Botnet Operators

    A honeypot experiment ran by AlientVault has shown that the recent security vulnerabilities discovered in Elasticsearch servers over the summer are now actively being used by botnet operators.

  • Researchers Found Another Malware Targeting Linux Users

    Many analysts believe Rebooke is a harmless Trojan which is true, but its simple design allows the attacker to maneuver the type of attacks which can allow them to deliver powerful payloads on the systems.

  • Let’s Encrypt May Improve Security for Regular People More Than Any Other Initiative This Decade

    Secure websites have always been standard for ecommerce companies like Amazon or Shopify, and in recent years companies that handle private communications like Google and Facebook have invested millions of dollars in enabling encryption for all users. But what about everyone else?

  • Public Beta: December 3, 2015

    Let’s Encrypt will enter Public Beta on December 3, 2015. Once we’ve entered Public Beta our systems will be open to anyone who would like to request a certificate. There will no longer be a requirement to sign up and wait for an invitation.

    Our Limited Beta started on September 12, 2015. We’ve issued over 11,000 certificates since then, and this operational experience has given us confidence that our systems are ready for an open Public Beta.

    It’s time for the Web to take a big step forward in terms of security and privacy. We want to see HTTPS become the default. Let’s Encrypt was built to enable that by making it as easy as possible to get and manage certificates.

  • Let’s encrypt automation on Debian
  • DHS to Silicon Valley: Tell us how to secure this “Internet of Things”

    The US Department of Homeland Security has announced that its Silicon Valley Office (SVO)—the agency's liaison point with the technology industry—will hold an event on December 10 to kick off a recruiting drive for startups and "non-traditional small businesses" interested in latching onto government funding. The Industry Day, being held at the Menlo Park, California, offices of SRI International, will be focused on the current leading source of worry for DHS officials: the "Internet of Things" (IoT).

  • Millions of smart TVs, phones and routers at risk from old vulnerability

    There's growing concern over how manufacturers of devices such as routers and smart TVs deal with security vulnerabilities that emerge in their products. Their patching regimes are not nearly as rigorous as those from major software manufacturers, which could expose consumers to attacks as the products age.

LibreOffice 5.1 Up to Beta State, the Hunting Session Squashes Nearly 400 Bugs

Filed under
LibO
Security

The first Beta build of the upcoming LibreOffice 5.1 open-source and cross-platform office suite was silently released at the end of November 2015 for all supported operating systems, including GNU/Linux, Mac OS X, and Microsoft Windows.

Read more

Linux Users Targeted by New Rekoobe Trojan

Filed under
Linux
Security

Linux users are about to get a nasty surprise for Christmas in the form of a new trojan targeting the Linux operating system, discovered by Dr.Web, a Russian-based antivirus maker, and named Rekoobe (or its more technical name: Linux.Rekoobe.1).

Read more

Syndicate content

More in Tux Machines

Linux Emerging as Alternative to MS Windows

According to industry sources, Linux-based operation systems of Tmax OS and InfraWare are gaining much attention as alternatives to the Microsoft Windows. The latest version of the Linux has been significantly improved in terms of installation and use, providing a user interface similar to that of the Windows and coming with various software tools for documentation, multimedia utilization, etc. In addition, constraints on the Linux in the financial and public sectors are being removed one after another with Internet environments adopting Web standards. Under the circumstances, the software industry is expecting that the utilization of open-source operating systems will spread to the general consumer market as well as the enterprise market. Read more

NethServer 6.8 Linux Server Fights Spam with DNS-Based Blackhole List (DNSBL)

NethServer Community Manager Alessio Fattorini informs Softpedia today about the general availability of the first Beta release of the NethServer 6.8 server-oriented GNU/Linux operating system. Based on the recently released CentOS 6.8 operating system, which in turn builds on the freely distributed sources of the commercial Red Hat Enterprise Linux 6.8 distro, NethServer 6.8 is now in development as the newest long-term support release. Read more

Comparing live version upgrade methods

When I review a distribution I always begin by performing a fresh installation of the operating system. This gives the latest version of the project a chance to stand on its own without complications. However, many of us do not perform fresh installations on our operating systems each time we want to upgrade to the latest release. Some of us, in order to preserve settings or installed packages, prefer to upgrade our existing operating system without starting over from scratch. This week I decided to take five open source operating systems through an upgrade process from their penultimate release to their latest version. Read more

Porteus Kiosk 4.0 Modular Linux Web Kiosk Released, Drops Chrome 32-bit Support

Porteus Solutions' Tomasz Jokiel announced on May 30, 2016, the release of the final Porteus Kiosk 4.0.0 Web Kiosk operating system based on the latest GNU/Linux technologies and open-source software. Porteus Kiosk 4.0.0 comes three months after the release of the last maintenance build in the Porteus Kiosk 3.x series, introducing numerous new features and improvements. But first, let's take a quick look under the hood, as the OS is now powered by Linux kernel 4.4.11 LTS (Long Term Support), and it's based on the Mozilla Firefox 45.1.1 ESR and Google Chrome 50.0.2661.102 web browsers. Read more