Language Selection

English French German Italian Portuguese Spanish

Security

Security News

Filed under
Security
  • Containerized Security: The Next Evolution of Virtualization?

    We in the security industry have gotten into a bad habit of focusing the majority of our attention and marketing dollars on raising awareness of the latest emerging threats and new technologies being developed to detect them. One just has to look at the headlines or spend fifteen minutes walking the show floor at a major security conference to see this trend. However, while we are focusing on what all the bad guys are doing, we’ve taken the eye off the ball of where our infrastructure business is going.

  • SDN Security Researchers State Their Case at Black Hat

    So say two of his grad students, Seungsoo Lee and Changhoon Yoon (left and right, respectively, in the photo above). But along with Shin, who’s now an assistant professor at the Korea Advanced Institute of Science and Technology (Kaist) and a research associate at the Open Networking Foundation (ONF), they’re hoping the industry is ready to start looking at the vulnerabilities that SDN introduces.

  • Widespread Linux Flaw Allows TCP Session Hijacking, Termination
  • Bungling Microsoft singlehandedly proves that golden backdoor keys are a terrible idea [Ed: Microsoft and backdoor should become synonymous. At every level, online and offline, Microsoft products booby-trapped with backdoors.]

    Microsoft leaked the golden keys that unlock Windows-powered tablets, phones and other devices sealed by Secure Boot – and is now scrambling to undo the blunder.

    These skeleton keys can be used to install non-Redmond operating systems on locked-down computers. In other words, on devices that do not allow you to disable Secure Boot even if you have administrator rights – such as ARM-based Windows RT tablets – it is now possible to sidestep this block and run, say, GNU/Linux or Android.

    What's more, it is believed it will be impossible for Microsoft to fully revoke the leaked keys.

    And perhaps most importantly: it is a reminder that demands by politicians and crimefighters for special keys, which can be used by investigators to unlock devices in criminal cases, will inevitably jeopardize the security of everyone.

    Microsoft's misstep was uncovered by two researchers, MY123 and Slipstream, who documented their findings here in a demoscene-themed writeup published on Tuesday. Slip believes Microsoft will find it impossible to undo its leak.

  • Microsoft Creates Backdoor In Windows, Accidentally Leaks UEFI Secure Boot Keys

    Two researchers reported that Microsoft accidentally compromised the golden keys to its UEFI Secure boot feature.

  • Can Copperhead OS fix Android's security problems?

Canonical Patches Multiple Kernel Vulnerabilities in All Supported Ubuntu OSes

Filed under
Security
Ubuntu

Today, August 10, 2016, Canonical published several security notices to inform Ubuntu Linux users about new kernel updates for their distributions, patching several vulnerabilities discovered recently.

Read more

Internet of Insecurity

Filed under
Security
  • Linux TCP flaw enables remote attacks

    Researchers at the University of California, Riverside, say they have found a weakness in the transmission control protocol (TCP) used by Linux since late 2012 which allows the remote hijacking of Internet communications.

  • Serious security threat to many Internet users highlighted
  • Your 'Smart' Thermostat Is Now Vulnerable To Ransomware

    We've noted time and time again how the much ballyhooed "internet of things" is a privacy and security dumpster fire, and the check is about to come due. Countless companies and "IoT" evangelists jumped head first into the profit party, few bothering to cast even a worried look over at the reality that basic security and privacy standards hadn't come along for the ride. The result has been an endless parade of not-so-smart devices and appliances that are busy either leaking your personal details or potentially putting your life at risk.

    Of course, the Internet of Things hype machine began with smart thermostats and the sexy, Apple-esque advertising of Nest. The fun and games didn't last however, especially after several botched firmware updates resulted in people being unable to heat or cool their homes (relatively essential for a thermostat).

Security News

Filed under
Security
  • No, 900 million Android devices are not at risk from the 'Quadrooter' monster

    Guys, gals, aardvarks, fishes: I'm running out of ways to say this. Your Android device is not in any immediate danger of being taken over a super-scary malware monster.

    It's a silly thing to say, I realize, but we go through this same song and dance every few months: Some company comes out with a sensational headline about how millions upon millions of Android users are in danger (DANGER!) of being infected (HOLY HELL!) by a Big, Bad Virus™ (A WHAT?!) any second now. Countless media outlets (cough, cough) pick up the story and run with it, latching onto that same sensational language without actually understanding a lick about Android security or the context that surrounds it.

    To wit: As you've no doubt seen by now, our latest Android malware scare du jour is something an antivirus software company called Check Point has smartly dubbed "Quadrooter" (a name worthy of Batman villain status if I've ever heard one). The company is shouting from the rooftops that 900 million (MILLION!) users are at risk of data loss, privacy loss, and presumably also loss of all bladder control -- all because of this hell-raising "Quadrooter" demon and its presence on Qualcomm's mobile processors.

  • 900 Million Androids Could Be Easy Prey for QuadRooter Exploits
  • Annoying "Open PDF in Edge" Default Option Puts Windows 10 Users at Risk

    Microsoft released today its monthly security patch, and one of the five security bulletins labeled as critical was a remote code execution (RCE) flaw in its standard PDF rendering library that could be exploited when opening PDF files.

Security News

Filed under
Security

Security News

Filed under
Security
  • Computers That Don't Track You

    Todd Weaver, the Founder and CEO of Purism shows Leo Laporte and Aaron Newcomb the Librem line of secure Linux computers. They discuss PureOS the operating system based on Debian, and how the computers are sourced and built. Plus, he talks about their line of no-carrier, encrypted smartphone coming next year.

  • The state of cyber security: we’re all screwed

    When cybersecurity professionals converged in Las Vegas last week to expose vulnerabilities and swap hacking techniques at Black Hat and Defcon, a consistent theme emerged: the internet is broken, and if we don’t do something soon, we risk permanent damage to our economy.

    “Half of all Americans are backing away from the net due to fears regarding security and privacy,” longtime tech security guru Dan Kaminsky said in his Black Hat keynote speech, citing a July 2015 study by the National Telecommunications and Information Administration. “We need to go ahead and get the internet fixed or risk losing this engine of beauty.”

  • Oh, not again: US reportedly finds new secret software in VW diesels [Ed: cannot trust proprietary software]

    Volkswagen first ended up in this situation after it admitted to intentionally installing secret software in its 2.0-liter diesels. That software curtailed nitrogen oxide emissions in lab-testing environments, but once on the road, the diesels would pollute well in excess of legal limitations. It was allegedly used in response to ever-stricter emissions regulations.

  • Chinese Hunting Chinese Over POP3 In Fjord Country

    More specifically, here at bsdly.net we've been seeing attempts at logging in to the pop3 mail retrieval service using usernames that sound distinctively like Chinese names, and the attempts originate almost exclusively from Chinese networks.

  • 'Sauron' spyware attacking targets in Belgium, China, Russia and Sweden

    A previously unknown hacking group called Strider has been conducting cyber espionage against selected targets in Belgium, China, Russia and Sweden, according to Symantec.

    The security firm suggested that the product of the espionage would be of interest to a nation state's intelligence services.

    Strider uses malware known as Remsec that appears primarily to have been designed for espionage, rather than as ransomware or any other nefarious software.

    Symantec has linked Strider with a group called Flamer which uses similar attack techniques and malware.

    The Lord of the Rings reference is deliberate as the Remsec stealth tool contains a reference to Sauron, the necromancer and main protagonist in a number of Tolkien's stories.

    "Strider has been active since at least October 2011. The group has maintained a low profile until now and its targets have been mainly organisations and individuals that would be of interest to a nation state's intelligence services," said Symantec in a blog post.

  • New MacBooks expected to feature Touch ID power button as well as OLED touch-panel [iophk: "as UID or password? Former is ok latter is insecure"]

    A source who has provided reliable information in the past has informed us that the new MacBook Pro models, expected to be launched in the fall, will feature a Touch ID power button as well as the previously-reported OLED touch-sensitive function keys.

  • it’s hard work printing nothing

    It all starts with a bug report to LibreSSL that the openssl tool crashes when it tries to print NULL. This bug doesn’t manifest on OpenBSD because libc will convert NULL strings to ”(null)” when printing. However, this behavior is not required, and as observed, it’s not universal. When snprintf silently accepts NULL, that simply leads to propagating the error.

  • London's Met Police has missed the Windows XP escape deadline [Ed: known problem, London's police is a prisoner of NSA and also China, Russia etc. [1, 2]]

    London’s Metropolitan Police has missed its deadline to dump Windows XP, with tens of thousands of copper still running the risky OS.

    The force, on the front line against terrorist threats and criminals in the capital city, is running Windows XP on around 27,000 PCs.

    At last count, in May 2015, the Met had a total of 35,640 PCs, with 34,920 of them running XP. Policemen set themselves a deadline of March 2016 to finish migrating to Windows 8.1.

    London Mayor Sadiq Khan, however, has apparently now revealed that just 8,000 of the force’s PCs have moved to Windows 8.1 since last September. The target is for another 6,000 by the end of September 2016.

    Khan provided the update in response to a question from Conservative Greater London Assembly member Andrew Boff.

  • Met Police still running Windows XP on 27,000 computers [iophk: "forget XP, Windows in general is dangerously out of date"]

    LONDON BOYS IN BLUE the Metropolitan Police may be armed with tasers and extendable batons, but they are backed up by Windows XP in a lot of cases, which is a really bad thing.

    Windows XP no longer gets official security updates, and Microsoft sees it as the sort of thing that should be scraped off shoes before walking on the carpet.

    The company will let people pay to keep using it, but only on a case-by-case basis. We do not know the police arrangement with Microsoft, but the Met needs to accelerate the updating of its computer systems as it puts Londoners' information at risk, according to London Assembly member Andrew Boff.

Security News

Filed under
Security

Security News

Filed under
Security
  • Protect yourself from cyberattacks

    3. Install Linux (free). One big decision making factor will be the age of your computer. If your hardware is old, you may well be better off replacing it with something new.

    I mentioned Linux, which has a few advantages. Windows as you are familiar with, is susceptible to infections by malware (viruses, adware, spyware, etc.), whereas Linux is practically invulnerable to infection. Part of that is down to the dominance of Windows, making it a big fat target, but it is also down to the Linux architecture making it extremely hard to hack. Another advantage with Linux (from my experience using Ubuntu), is that updates are generally installed without having to restart your machine. When a restart is needed, it is nice and quick, unlike a certain other operating system that spends ages ‘configuring updates’.

  • Nigerian Scammers Infect Themselves With Own Malware, Revealing New Wire-Wire Fraud Scheme [Ed: Windows]

    Once they’re in, the scammers allow the employee to continue with business as usual and discreetly monitor the account for potential financial transactions. As soon as they see that the employee is sending an invoice to a customer, they reroute it through their own email account and physically alter the account number and routing number before forwarding it on to the customer. The email address they use is often very similar to the original email address, so it’s easy to miss. Unlike spoofing, BEC techniques such as wire-wire rely on earning internal account access rather than externally impersonating a company account.

  • Is Hidden Linux Subsystem In Windows 10 Making Your PC Unsafe? [Ed: not any worse than a keylogger with back doors]
  • DARPA Cyber Grand Challenge Ends With Mayhem

    After three years of planning and lead-up contests, the finals of the Defense Advanced Research Projects Agency's Cyber Grand Challenge (CGC) to show the best in autonomous computer security concluded with a win by the Mayhem system from the ForAllSecure team, which won the $2 million grand prize. The Xandra system finished in second place, winning $1 million, while the Mechaphish system placed third, claiming $750,000.

Security Leftovers

Filed under
Security
  • Hackers Could Break Into Your Monitor To Spy on You and Manipulate Your Pixels

    We think of our monitors as passive entities. The computer sends them data, and they somehow—magically?—turn it into pixels which make words and pictures.

    But what if that wasn’t the case? What if hackers could hijack our monitors and turn them against us?

    As it turns out, that’s possible. A group of researchers has found a way to hack directly into the tiny computer that controls your monitor without getting into your actual computer, and both see the pixels displayed on the monitor—effectively spying on you—and also manipulate the pixels to display different images.

  • Computer Expert Hacks Into Common Voting Machine in Minutes to Reveal Shocking 2016 Election Threat

    It took Princeton computer science professor Andrew Appel and one of his graduate students just minutes to hack into a voting machine still used in Louisiana, New Jersey, Virginia, and Pennsylvania, Politico reports.

    Professor Andrew Appel purchased for $82 a Sequoia AVC Advantage, one of the oldest machines still in use. Within 7 seconds, he and his student, Alex Halderman, had picked the lock open. Within minutes, the duo had removed the device’s unsecured ROM chips with their own hardware that makes it easy to alter the machine’s results.

  • Researchers Bypass Chip-and-Pin Protections at Black Hat

    Credit card companies for the most part have moved away from “swipe and signature” credit cards to chip and pin cards by this point; the technology known as EMV (Europay, MasterCard, and Visa) which is supposed to provide consumers with an added layer of security is beginning to see some wear, according to researchers.

Syndicate content

More in Tux Machines

Canonical Patches Nvidia Graphics Drivers Vulnerability in All Ubuntu Releases

It's time to update your Ubuntu Linux operating system if you have a Nvidia graphics card running the Nvidia Legacy 340 or 304 binary X.Org drivers provided on the official software repositories. Read more

Long-term Embedded Linux Maintenance andd New Device From CompuLab

  • Long-term Embedded Linux Maintenance Made Easier
    The good old days when security breaches only happened to Windows folk are fading fast. Malware hackers and denial of service specialists are increasingly targeting out of date embedded Linux devices, and fixing Linux security vulnerabilities was the topic of several presentations at the Embedded Linux Conference Europe (ELCE) in October. One of the best attended was “Long-Term Maintenance, or How to (Mis-)Manage Embedded Systems for 10+ Years” by Pengutronix kernel hacker Jan Lübbe. After summarizing the growing security threats in embedded Linux, Lübbe laid out a plan to keep long-life devices secure and fully functional. “We need to move to newer, more stable kernels and do continuous maintenance to fix critical vulnerabilities,” said Lübbe. “We need to do the upstreaming and automate processes, and put in place a sustainable workflow. We don’t have any more excuses for leaving systems in the field with outdated software.”
  • CompuLab Has Upgraded Their Small Form Factor "IPC" Line To Kabylake
    HARDWARE -- Our friends and Linux-friendly PC vendor, CompuLab, have announced a new "IPC" line-up of their small form factor computers now with Intel Kabylake processors. In the past on Phoronix we tested CompuLab's Intense-PC (IPC) and then the IPC2 with Haswell processors, among other innovative PCs from CompuLab. Now they are rolling out the IPC3 with Intel's latest Kabylake processors.
  • Fanless mini-PC runs Linux Mint on Kaby Lake
    Compulab launched a rugged “IPC3” mini-PC that runs Linux on dual-core, 7th Gen Core i7/i5 CPUs, and also debuted three GbE-equipped FACE expansion modules. Compulab has opened pre-orders starting at $693 for the first mini-PCs we’ve seen to offer the latest, 14nm-fabricated 7th Generation Intel Core “Kaby Lake” processors. The passively cooled, 190 x 160 x 40mm IPC3 (Intense PC 3), which is available in up to industrial temperature ranges, follows two generations of similarly sized IPC2 mini-PCs. There’s the still available, 4th Gen “Haswell” based IPC2 from 2014 and the apparently discontinued 5th Gen “Broadwell” equipped IPC2 from 2015.
  • Compulab IPC3 is a tiny, fanless PC with Intel Kaby Lake CPU
    Compulab is an Israeli company that makes small, fanless computers for home or commercial use. The company’s latest mini PC aimed at enterprise/industrial usage is called the IPC3, and it has a die-cast aluminum case with built-in heat sinks for passive cooling and measures about 7.4″ x 6.3″ x 1.6″.

Games for GNU/Linux

  • Imperium Galactica II: Alliances released for Linux & SteamOS, seems native too
    Imperium Galactica II: Alliances [GOG, Steam] just released for Linux & SteamOS and it looks like it's a native version. Note: My friends at GOG sent over a copy, so big thanks to them. There's no sign of DOSBox or Wine and I had no idea this game had ever been ported to Linux. Pretty awesome really for a game like this to get a proper Linux build when it gets a new release.
  • Nearly five years after the Kickstarter, Carmageddon still isn’t on Linux despite the stretch goal being reached
    The problem here, for me, is that they later did a revamp of the title called Carmageddon: Max Damage. This was to fix some problems, boost sales again and port it to consoles. Carmageddon: Max Damage also never made it to Linux. Fun fact, they actually released a trailer where they just run over a ton of penguins, make from that what you will: Not saying this was trolling the entire Linux gaming community, but it sure felt like it after their previous trolling attempts directed at our official Twitter account.
  • Valve Rolls Out New Steam Client Stable Update with Promised Linux Changes, More
    Today Valve announced the availability of a new stable update of the Steam Client for all supported platforms, including the company's SteamOS operating system for Steam Machines, as well as GNU/Linux, macOS, and Microsoft Windows. Bringing all the new features during the Beta stages of development, the new Steam Client update improves the interaction between the Steam runtime and your GNU/Linux distribution's libraries. This is a huge and long-anticipated milestone for the Steam Client, which, unfortunately, did not work out-of-the-box on all Linux-based operating systems.

Robolinux 8.7.1 Linux OS Is Out and It's Based on Debian GNU/Linux 8.7 "Jessie"

The developers of the Robolinux GNU/Linux distribution have announced today, January 18, 2017, the release and immediate availability of a new stable update based on the latest Debian GNU/Linux 8 "Jessie" operating system series. Still offering a free installer, the Robolinux 8.7.1 "Raptor" edition is now available for download with the usual Cinnamon, MATE 3D, Xfce 3D, and LXDE flavors. It's based on the recently released Debian GNU/Linux 8.7.1 "Jessie" operating system, which means that it ships with its newest Linux 3.16 kernel and over 170 bug fixes and security patches. The GRUB bootloader and login screens have been refreshed too. Read more