Language Selection

English French German Italian Portuguese Spanish

Security

Security of GNU/Linux Systems

Filed under
Linux
Security

mrpogson.com: I was surprised to see Brazil in the list of systems compromised by “Anonymous” recently. To demonstrate the compromise, /etc/passwd from some systems was published.

Dropbox 'deceived' users over security: Files are open to government searches

Filed under
Security

zdnet.com: Dropbox ‘deceived’ users about the security and encryption of its cloud storage services, according to a complaint made to the FTC.

Re: Botnets exploit Linux owners' ignorance

Filed under
Linux
Security

dedoimedo.com: After Flaming retort, I have another rebuttal. Another piece of scaremongering, with overhyped drama and sensationalism, wrapped in tech lingo to make the crowds shudder with fear and reverence. Today, I want to talk to you about a short article called Botnets exploit Linux owners' ignorance.

Tiny Core Fraud on Source Forge

Filed under
Linux
Security
Web

jeffhoogland.blogspot: If you watch new projects that are added to source forge then two weeks ago you might have noticed that Tiny Core Linux was added to their projects. I thought this was a little bit odd.

Pwn2Own: Chrome, Android, Firefox own; Safari, IE8, iOS, BB get pwned

Filed under
Software
Security

afterdawn.com: Two days into the Pwn2Own hacking challenge, only a few still remain. So far, hackers have not been able to exploit Mozilla Firefox 3.6, Google Chrome, and the mobile Android OS.

Why Pwn2Own doesn't target Linux

Filed under
Linux
Security

internetnews.com: The annual Pwn2Own hacking challenge kicks off today, pitting security researchers against web browsers and mobile platforms. The HP TippingPoint sponsored event grows every year to include more platforms, though Linux isn't among them.

Linux distributor security list destroyed after hacker compromise

Filed under
Linux
Security
BSD

zdnet.com: Hackers have compromised a private e-mail list used by Linux and BSD distributors to share information on embargoed security vulnerabilities and used a backdoor to sniff e-mail traffic, according to the moderator of the list.

Once Upon A Time, There Was A USB Vulnerability In Linux

Filed under
Security

muktware.com: GNU/Linux systems are immune to viruses is anything but myth. Viruses, malware are programs with destructive intentions and can be installed on any machine, if an attacker/cracker (not hacker for god's sake, you idiot) has physical access to it. You can install a malicious code on your own computer if you want. No one can stop you.

London Stock Exchange 'under major cyberattack' during Linux switch

Filed under
Linux
Security

computerworlduk.com: The London Stock Exchange’s new open source trading system may have been hacked last year, according to a report.

Sourceforge Attack: Full Report

Filed under
Security
Web

sourceforge.net: As we’ve previously announced, SourceForge.net has been the target of a directed attack. We have completed the first round of analysis, and have a much more solid picture of what happened, the extent of the impact, our plan to reduce future risk of attack.

Syndicate content

More in Tux Machines

Privacy and Tails 1.3

Privacy and security are difficult to come by in our progressively connected world. Advertisers track our browsing habits, employers monitor productivity and government agencies monitor our communications. Most operating systems do not take steps to protect our privacy or our identities, two things which are increasingly difficult to guard. Tails is a Linux distribution that is designed to help us stay anonymous on-line and protect our identity. Tails is a Debian-based live disc that we can use to scrub our files of meta data, browse the web with some degree of anonymity and send private messages. According to the project's website, "Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to: use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging." Read more

Review: Lenovo X1 Carbon 3rd generation and Linux

Considering that the fix for the first issue is widely available in most distributions and the second one is only a modprobe away, I’d say this laptop is pretty darned Linux compatible. I’m currently running Fedora 21 without any problems. Read more