Language Selection

English French German Italian Portuguese Spanish

Security

Debian Pushes Major Kernel Update to Debian Jessie, Fixes Over 20 Security Flaws

Filed under
Security
Debian

Today, June 28, 2016, Debian Project, through Salvatore Bonaccorso, published details about a major Linux kernel security update for the Debian GNU/Linux 8 "Jessie" operating system.

Read more

Security Leftovers

Filed under
Security
  • Chrome vulnerability lets attackers steal movies from streaming services

    A significant security vulnerability in Google technology that is supposed to protect videos streamed via Google Chrome has been discovered by researchers from the Ben-Gurion University of the Negev Cyber Security Research Center (CSRC) in collaboration with a security researcher from Telekom Innovation Laboratories in Berlin, Germany.

  • Large botnet of CCTV devices knock the snot out of jewelry website

    Researchers have encountered a denial-of-service botnet that's made up of more than 25,000 Internet-connected closed circuit TV devices.

    The researchers with Security firm Sucuri came across the malicious network while defending a small brick-and-mortar jewelry shop against a distributed denial-of-service attack. The unnamed site was choking on an assault that delivered almost 35,000 HTTP requests per second, making it unreachable to legitimate users. When Sucuri used a network addressing and routing system known as Anycast to neutralize the attack, the assailants increased the number of HTTP requests to 50,000 per second.

  • Study finds Password Misuse in Hospitals a Steaming Hot Mess

    Hospitals are pretty hygienic places – except when it comes to passwords, it seems.

    That’s the conclusion of a recent study by researchers at Dartmouth College, the University of Pennsylvania and USC, which found that efforts to circumvent password protections are “endemic” in healthcare environments and mostly go unnoticed by hospital IT staff.

    The report describes what can only be described as wholesale abandonment of security best practices at hospitals and other clinical environments – with the bad behavior being driven by necessity rather than malice.

  • Why are hackers increasingly targeting the healthcare industry?

    Cyber-attacks in the healthcare environment are on the rise, with recent research suggesting that critical healthcare systems could be vulnerable to attack.

    In general, the healthcare industry is proving lucrative for cybercriminals because medical data can be used in multiple ways, for example fraud or identify theft. This personal data often contains information regarding a patient’s medical history, which could be used in targeted spear-phishing attacks.

  • Making the internet more secure
  • Beyond Monocultures
  • Dodging Raindrops Escaping the Public Cloud

Security Leftovers

Filed under
Security

Canonical Patches Seven Linux Kernel Vulnerabilities in Ubuntu 16.04, Update Now

Filed under
Linux
Security
Ubuntu

Today, June 27, 2016, Canonical published a new security notice to inform users of the Ubuntu 16.04 LTS (Xenial Xerus) operating system about the availability of an important kernel update.

Read more

Leftovers: Security

Filed under
Security

Security Leftovers

Filed under
Security
  • Teardrop Attack: What Is It And How Does It Work?

    In Teardrop Attack, fragmented packets that are sent in the to the target machine, are buggy in nature and the victim’s machine is unable to reassemble those packets due to the bug in the TCP/IP fragmentation.

  • Updating code can mean fewer security headaches

    Organizations with high rates of code deployments spend half as much time fixing security issues as organizations without such frequent code updates, according to a newly released study.

    In its latest annual state-of-the-developer report, Devops software provider Puppet found that by better integrating security objectives into daily work, teams in "high-performing organizations" build more secure systems. The report, which surveyed 4,600 technical professionals worldwide, defines high IT performers as offering on-demand, multiple code deploys per day, with lead times for changes of less than one hour. Puppet has been publishing its annual report for five years.

  • Over half of world's top domains weak against email spoofing

    Over half of the world's most popular online services have misconfigured servers which could place users at risk from spoof emails, researchers have warned.

    According to Swedish cybersecurity firm Detectify, poor authentication processes and configuration settings in servers belonging to hundreds of major online domains are could put users at risk of legitimate-looking phishing campaigns and fraudulent emails.

Linux Kernel 4.6.3 Has Multiple Networking Improvements, Better SPARC Support

Filed under
Linux
Security

Today, June 24, 2016, renowned Linux kernel developer Greg Kroah-Hartman has announced the general availability of the third maintenance release for the Linux 4.6 kernel series.

Linux kernel 4.6.3 is here two weeks after the release of the second maintenance update in the series, Linux kernel 4.6.2, to change a total of 88 files, with 1302 insertions and 967 deletions. Unfortunately, very few GNU/Linux distributions have adopted the Linux 4.6 series, despite the fact that Greg Kroah-Hartman urged everyone to move to this most advanced kernel branch as soon as possible from Linux 4.5, which reached end of life.

Read more

Security Leftovers

Filed under
Security

Security Leftovers

Filed under
Security
  • Security updates for Tuesday
  • Google Hacker Donates His $15,000 Bug Bounty Cash Award To Charity

    Google’s leading security engineer Tavis Ormandy recently won a bug bounty challenge run by security solutions firm Bromium and decided to donate the money to charity. Following his gesture, Bromium matched Ormandy’s donation and donated $15,000 to Amnesty International organization.

  • Mozilla Awards $385,000 to Open Source Projects as part of MOSS “Mission Partners” Program

    For many years people with visual impairments and the legally blind have paid a steep price to access the Web on Windows-based computers. The market-leading software for screen readers costs well over $1,000. The high price is a considerable obstacle to keeping the Web open and accessible to all. The NVDA Project has developed an open source screen reader that is free to download and to use, and which works well with Firefox. NVDA aligns with one of the Mozilla Manifesto’s principles: “The Internet is a global public resource that must remain open and accessible.”

  • TOR Project And Security Experts Making A “Hardened” Version Of TOR To Defeat FBI

    The TOR Project is working closely with security researchers to implement a new technique to secure the TOR Browser against the FBI’s de-anonymization exploits. Called “Selfrando”, this technique will fight the FBI’s “Code Reuse” exploits and create a “hardened” version of TOR.

Security Leftovers

Filed under
Security
  • New RAA ransomware written in JavaScript discovered

    A new variety of ransomware called RAA has been discovered that has the somewhat unusual attribution of being coded in JavaScript instead of one of the more standard programming languages making it more effective in certain situations.

  • Want To Be A Cool Security Guru?

    Well it will take some work, security is not like what they show on TV. You don’t need green on black text, special goggles or an unlimited enhance function. Instead, it requires sitting down and understanding the history of the field, what it means to be “secure” and what limitations or assumptions you can work under. This summer I have decided to start my journey on the vast field of cryptography and am doing an online course at Stanford University that provides an introduction to cryptography. It is appropriately named “Cryptography I” and is the first part of a two part course, the second part being offered later in the Fall. Both are taught by a really awesome professor Dan Boneh who I find explains the material very well. I decided I would like to make some posts about what I have learned in this course as I go through the material so that I can share my knowledge and get a chance to write it down somewhere for later reference.

  • WordPress 4.5.3 Maintenance and Security Release

    WordPress 4.5.3 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately.

Syndicate content

More in Tux Machines

4MLinux 20.1 released.

This is a minor maintenance release in the 4MLinux STABLE channel. The release ships with the Linux kernel 4.4.34, which restores PAE support that "magically" disappeared in 4MLinux 20.0 (sorry :-). Additionally, some popular programs (Double Commander, Dropbox, Firefox, Java RE, Opera, PeaZip, Thunderbird, Wine) have been updated, too. Read more

Refracta 8.0 Is a Pint-Sized Powerhouse

Refracta is a somewhat obscure Linux distribution that offers exceptional functionality and stability. Obscurity is not always a bad thing when it comes to Linux distros. You can find some very worthwhile alternatives to your current operating system. Refracta is a big surprise in a small package. Many look-alike desktop distros are difficult to distinguish from run-of-the-mill garden varieties. Others offer new adopters something unique that makes using them fun and productive. Refracta is one of the few full-service Linux distros that makes an easy and more convenient replacement for pocket Linux options such as Puppy Linux. Not all Linux distros that install to a USB drive -- and have the ability to save files and system settings in a persistent mode -- work equally well. Read more

Clear Linux With Mesa 13 Is A Strong Match For Intel Linux Performance

When benchmarking Intel's Clear Linux distribution earlier this year we found its Intel graphics performance to be quite good and slightly faster than other Linux distributions even when Clear was using an older version of Mesa. Now with Clear Linux having switched to Mesa 13, I decided to run some fresh Intel OpenGL benchmarks on it compared to other distributions. Read more

PTS: PHP 7.1 vs. PHP 7.0 vs. HHVM Benchmarks

With today's PHP 7.1 release, performance isn't highlighted as much as language improvements to this first major update to PHP7, but I decided to run some PHP 7.1, PHP 7.0, PHP 5.6, PHP 5.5, and HHVM benchmarks of our open-source Phoronix Test Suite code-base. These self-tests of the Phoronix Test Suite aren't the conventional PHP workload of just a CMS, blog, or other web application that can be cached, etc, but effectively of a PHP CLI application. So keep this in mind when looking at the results and that your mileage may vary depending upon use-case. Read more