Language Selection

English French German Italian Portuguese Spanish

Security

Security Leftovers

Filed under
Security

Security Leftovers

Filed under
Security
  • Chaos Computer Club: Europe's biggest hackers' congress underway in Hamburg

    Some 12,000 hackers are challenging the power of Google, Facebook and Youtube to filter information and shape users' view of the world. One of them demonstrated how to hack into VW's cheating software.

  • Password-less database 'open-sources' 191m US voter records on the web

    Austin-based Chris Vickery – who earlier this month found records on 3.3 million Hello Kitty users splashed online – says the wide-open system contains the full names, dates of birth, home addresses, and phone numbers of voters, as well as their likely political affiliation and which elections they have voted in since 2000.

  • The next wave of cybercrime will come through your smart TV

    Smart TVs are opening a new window of attack for cybercriminals, as their security defenses often lag far behind those of smartphones and desktop computers.

    Smart TVs are opening a new window of attack for cybercriminals, as the security defenses of the devices often lag far behind those of smartphones and desktop computers.

    Running mobile operating systems such as Android, smart TVs present a soft target due to how to manufacturers are emphasizing convenience for users over security, a trade-off that could have severe consequences.

  • Nemesis Bootkit Malware the new stealthy Payment Card.

    After I read many articles I got this infos about Nemesis Bootkit Malware:
    - suspected to originate from Russia;
    - infect PCs by loading before Windows starts
    - has ability to modify the legitimate volume boot record;
    - seam to be like another Windows rootkit named Alureon;
    - intercepts several system interrupts to pass boot process;
    - can steal payment data from anyone's not just targeting financial institutions and retailers;
    - this malware hides between partitions and is also almost impossible to remove;

  • Thanks to Apple, WebKitGTK+ Devs Patch More Than 100 Security Vulnerabilities

    The developers of the WebKitGTK+ open source WebKit rendering engine used in the popular GNOME desktop environment reported that the software has been hit hard by over 130 security vulnerabilities, urging all users to update as soon as possible.

See why Keeper is a world-class Android password manager

Filed under
Android
Security

I highly recommend using a password manager on your mobile device. You have to do as much as you can to keep sensitive data from prying eyes. If you must carry passwords with you, an app like Keeper is a must have.

Read more

Open Source Software's Role in Breach Prevention and Detection

Filed under
OSS
Security

Security professionals are increasingly acknowledging an uncomfortable truth: No network is secure from a sufficiently skilled and determined attacker. So while every effort should be made to prevent intruders getting on to the corporate network, it's important that you can quickly spot an intrusion and minimize the damage that can result.

Anton Chuvakin, a security expert at Gartner, points out that if hackers are made to work hard to find what they are after, intrusion prevention and detection systems have a far greater chance of spotting them before they can do too much damage.

Read more

WebKitGTK+ security status

Filed under
GNOME
Security

Security: GNU/Linux Versus Windows

Filed under
Microsoft
Security
  • Towards (reasonably) trustworthy x86 laptops

    Can we build trustworthy client systems on x86 hardware? What are the main challenges? What can we do about them, realistically? Is there anything we can?

  • Recently Bought a Windows Computer? Microsoft Probably Has Your Encryption Key [Ed: yes, flawed by design]

    One of the excellent features of new Windows devices is that disk encryption is built-in and turned on by default, protecting your data in case your device is lost or stolen. But what is less well-known is that, if you are like most users and login to Windows 10 using your Microsoft account, your computer automatically uploaded a copy of your recovery key – which can be used to unlock your encrypted disk – to Microsoft’s servers, probably without your knowledge and without an option to opt-out.

    During the “crypto wars” of the nineties, the National Security Agency developed an encryption backdoor technology – endorsed and promoted by the Clinton administration – called the Clipper chip, which they hoped telecom companies would use to sell backdoored crypto phones. Essentially, every phone with a Clipper chip would come with an encryption key, but the government would also get a copy of that key – this is known as key escrow – with the promise to only use it in response to a valid warrant. But due to public outcry and the availability of encryption tools like PGP, which the government didn’t control, the Clipper chip program ceased to be relevant by 1996. (Today, most phone calls still aren’t encrypted. You can use the free, open source, backdoorless Signal app to make encrypted calls.)

Security Leftovers

Filed under
Security
  • Security Researchers Offer Warnings About Hackable Railroads

    The well-being of critical infrastructure and transportation has long been the elephant in the room when it comes to cybersecurity: plenty of researchers have warned about the possibility of attacks on power-plants, the national grid, and, more recently, even the emergence of internet connected cars.

    Now, researchers are warning of the gaping holes in the security of railroad systems. On Sunday at Chaos Communication Congress, a security, arts and politics conference held annually in Hamburg, Germany, members of the SCADA StrangeLove collective presented a long list of problems with railroad systems that attackers could exploit.

  • DLL Hijacking Just Won’t Die

    To make a long and complicated story short, a bad guy who exploits this vulnerability places a malicious DLL into your browser’s Downloads folder, then waits. When you run an installer built by an earlier version of NSIS from that folder, the elevation prompt (assuming it runs at admin) shows the legitimate installer’s signature asking you for permission to run the installer. After you grant permission, the victim installer loads the malicious DLL which runs its malicious code with the installer’s permissions. And then it’s not your computer anymore.

  • CA Council to Improve Internet Certificate Security in 2016

    At the heart of much of the Internet's security is the use of Secure Sockets Layer/Transport Layer Security (SSL/TLS), which provides encryption for data in motion. Certificate Authorities (CAs) are the trusted entities that issue TLS certificates, and as a group, the CAs are gearing up for big year in 2016, with multiple efforts designed to improve the security of the Internet.

  • Backspace Flaw Enables Linux Zero-Day Attack

Purism's Librem 13 laptop will come with Qubes OS installed

Filed under
GNU
Linux
Security

Most Linux distributions are fairly similar these days, but Qubes OS is different. Qubes OS is based on Linux, but it runs applications in lightweight virtual machines. Applications can be completely isolated from each other, limiting the damage a security vulnerability can cause and aiding in privacy. It's no surprise Edward Snowden said he was excited by Qubes OS.

Read more

Security Leftovers

Filed under
Security
  • #OLEOutlook - bypass almost every Corporate security control with a point’n’click GUI

    In this tutorial, I will show you how to embed an executable into a corporate network via email, behind the firewall(s), disguised as a Word document. There is no patch for this issue.

  • Somebody Tried to Get a Raspberry Pi Exec to Install Malware on Its Devices

    Liz Upton, the Director of Communications for the Raspberry Pi Foundation, has tweeted out a screenshot of an email where an unknown person has proposed that the Foundation install malware on all of its devices.

    In the email, a person named Linda, is proposing Mrs. Upton an agreement where their company would provide an EXE file that installs a desktop shortcut, that when clicked redirects users to a specific website. (Raspberry Pi devices can run Windows as well, not just Linux variants.)

  • Botnet of Aethra Routers Used for Brute-Forcing WordPress Sites

    Italian security researchers from VoidSec have come across a botnet structure that was using vulnerable Aethra Internet routers and modems to launch brute-force attacks on WordPress websites.

  • Steam Had A Very Rough Christmas With A Major Security Issue

    The security issue looks like it might be resolved now, but resulted in gamers being able to see other account holder's information. Seeing other accounts included partial credit card information, addresses, and other personal information. For a while, the Steam store was completely shut down. The issue seems to stem from some caching issues due to account holders being presented with the wrong information.

Security Leftovers

Filed under
Security
  • Thursday's security updates
  • MMD-0047-2015 - SSHV: SSH bruter ELF botnet malware w/hidden process kernel module
  • Another “critical” “VPN” “vulnerability” and why Port Fail is bullshit

    The morning of November 26 brought me interesting news: guys from Perfect Privacy disclosed the Port Fail vulnerability, which can lead to an IP address leak for clients of VPN services with a “port forwarding” feature. I was indignant about their use of the word “vulnerability”. It’s not a vulnerability, just a routing feature: Traffic to VPN server always goes via ISP, outside of VPN tunnel. Pretty obvious thing, I thought, which should be known by any network administrator. Besides that, the note is technically correct, so nothing to worry about. But then the headlines came, and shit hit the fan.

  • Cracking Linux with the backspace key?

    The source of these reports is a mildly hype-ridden disclosure of a vulnerability in the GRUB2 bootloader by Hector Marco and Ismael Ripoll. It seems that hitting the backspace character at the GRUB2 username prompt enough times will trigger an integer underflow, allowing a bypass of GRUB2's authentication stage. According to the authors, this vulnerability, exploitable for denial-of-service, information-disclosure, and code-execution attacks, "results in an incalculable number of affected devices." It is indeed a serious vulnerability in some settings and it needs to be fixed. Unfortunately, some of the most severely affected systems may also be the hardest to patch. But language like the above leads reporters to write that any Linux system can be broken into using the backspace key, which stretches the truth somewhat.

Syndicate content

More in Tux Machines

Samsung begins updating Z1 Smartphone in India to Tizen 2.4 – version Z130HDDU0CPB1

Today, we have some good news for our Samsung Z1 readers that are based in India, as their Z1 Smartphones begin receiving the much awaited final release of the Tizen 2.4 Operating System update version Z130HDDU0CPB1. The update will be delivered Over the Air (OTA), so will either use your WiFi or network providers cellular data. It is advised to use WiFi as the update is pretty big. For Tizen 2.3 users the size of the update from BOK2(2.3) is ~262MB. For Tizen 2.4 Beta users who are on COL6 the size of the update is ~17MB. Read more

Example Uses Of The Linux grep Command

The Linux grep command is used as a method for filtering input. GREP stands for Global Regular Expression Printer and therefore in order to use it effectively you should have some knowledge about regular expressions. In this article I am going to show you a number of examples which will help you understand the grep command. Read more

Red Hat encourages open source adoption at Asia Pacific Forum in Philippines

Red Hat, Inc. yesterday hosted the Red Hat Forum Asia Pacific in Manila, the Philippines. The conference provided an outlet for local businesses to discuss and learn about open source technology innovations, successes, and best practices. With this year’s theme, “Energize Your Enterprise,” the Red Hat Forum focused on the IT solutions enterprises are using to help innovate and transform the way business is done. In addition to Red Hat’s technology vision keynote, speakers covered a range of topics, from containers to the Internet of Things (IoT). Read more

today's leftovers

  • Readers Say ‘No’ to Antivirus on Linux
    A few weeks back when Ken Starks wrote an anecdotal column on an experience with a false positive from Avast antivirus on GNU/Linux, we started thinking. We run antivirus on our LAMP servers with the intent of protecting poor suckers on Windows, but on our Linux desktops and laptops? Pretty much, no. Some of us had tried the open source ClamAV at one time or another, mainly out of curiosity, but none of us had stuck with it. To our knowledge, until Starks wrote his column none of us even knew anybody who had ever run proprietary AV on Linux boxes.
  • openSUSE Tumbleweed – Review of the week 2016/4 & 5
  • Almost weekend again – what’s in store
    I updated my packages for calibre and chromium with new versions. I updated the set of “compat32” packages for a multilib setup on slackware64-current to match the Slackware packages contained in the new Slackware 14.2 Beta 2.
  • Slackware 14.2 Beta 2 Announced
    Good news for everyone. Slackware 14.2 is getting close to release as Pat now announced Slackware 14.2 Beta 2 on the latest changelog. This update also brings some security changes for all supported Slackware releases back to Slackware 13.0!!!
  • Make a $40 Linux or Android PC with this tiny new Raspberry Pi 2 rival
    If you want to build a powerful $40 Linux or Android PC with 4K video support, consider Hardkernel’s Odroid-C2 computer. The developer board is an uncased computer like the popular Raspberry Pi 2, which sells for $35. But South Korea-based Hardkernel claims Odroid-C2 has more horsepower than its popular rival and can be a desktop replacement.