|
Source: arsTechnica - Posted by Dave Wreski
|
In one of more impressive hacks in recent memory, researchers have devised an attack that exploits physical weaknesses in certain types of DDR memory chips to elevate the system rights of untrusted users of Intel-compatible PCs running Linux. |
|
|
Source: The Register UK - Posted by Alex
|
The UK Parliamentary Office of Science and Technology (POST) has issued a POSTnote titled “The darknet and online anonymity” in which it assesses the threats posed by anonymity technologies like Tor and concludes there's not much governments or law enforcement agencies can do about them. |
|
|
Source: Network World - Posted by Anthony Pell
|
In an effort to stop the U.S. government from spying on Wikipedia’s readers and editors, the Wikimedia Foundation will sue the U.S. National Security Agency (NSA) and the Department of Justice (DOJ).
|
|
|
Source: ThreatPost - Posted by Dave Wreski
|
Not long ago, criminals pushing the Dridex banking Trojan were using Microsoft Excel documents spiked with a malicious macro as a phishing lure to entice victims to load the malware onto their machines.
|
|
|
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas
|
Thank you for reading the LinuxSecurity.com weekly security newsletter.
The purpose of this document is to provide our readers with a quick
summary of each week's most relevant Linux security headlines. |
|
|
Source: CSO Online - Posted by Alex
|
A self-described security "amateur" discovered hundreds of Internet-connected devices ranging from cameras to industrial control systems that were connected to the Internet without even basic password protection -- meaning they could be easily turned on and off or otherwise manipulated with a single click of a mouse. |
|
|
Source: Network World - Posted by Dave Wreski
|
Some people who use uTorrent, the popular BitTorrent client, are up in arms over the presence of cryptocurrency mining software on their computers which they say was installed without their permission.
|
|
|
Source: Top Tech News - Posted by Dave Wreski
|
No, it's not always a room filled with wires and glowing blue lights. It's probably not even the size of your furnace. The personal email server used by Hillary Rodham Clinton during her time as secretary of state was probably about the size of your office desktop computer and could have been tucked quietly in a corner somewhere. |
|
|
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas
|
Thank you for reading the Linux Advisory Watch Security Newsletter.
The purpose of this document is to provide our readers with a quick
summary of each week's vendor security bulletins and pointers on
methods to improve the security posture of your open source system. |
|
|
Source: CSO Online - Posted by Dave Wreski
|
Criminals setting up fake domains for phishing are prone to use the same words over and over and spotting those words can help identify malicious sites, according to a new threat detection model from OpenDNS.
|
|
|
Source: ThreatPost - Posted by Dave Wreski
|
A coalition of 63 non-governmental organizations (NGOs) from around the world are calling on national governments to support the establishment of a special rapporteur on the right to privacy within the United Nations.
|
|
|
Source: The Register UK - Posted by Dave Wreski
|
Hundreds of cloud providers are still vulnerable to the serious FREAK cryptographic vulnerability.
Skyhigh Networks found that 766 cloud services are still at risk 24 hours after FREAK was made public, based on an analysis of more than 10,000 different services.
|
|
|
Source: ThreatPost - Posted by Dave Wreski
|
From the time the first commercials aired during the American pro football championship game last month, CSI: Cyber has been one of the more talked-about and least-anticipated shows in recent memory. At least in tech circles. For normal viewers, it’s one of those shows that you wake up in the middle of at 10:27 after nodding off during Criminal Minds or CSI: Pet Detectives. |
|
|
Source: Network World - Posted by Anthony Pell
|
Edward Snowden, the former U.S. National Security Agency contractor who leaked details of the agency’s surveillance programs, is willing to return to the U.S. and face criminal charges, if he’s assured of a fair trial, according to a Russian news report. |
|