Loading...

Human Error Still the Largest Security Concern

LinuxSecurity.com: If one listens to the mainstream media, these are the biggest cyber security threats facing American businesses. When hackers from these regions make any move against western businesses and governments, the news is magnified ten-fold…

Share

To Evangelize Security, Get Out Of Your Comfort Zone

LinuxSecurity.com: I’m not a security professional — I can’t configure a firewall or hack my way out of a paper bag — but I’ve been lucky enough to live and work in the info security community for almost a decade now. For me, last week’s RSA Conferen…

Share

Reducing Power Consumption on Haswell and Broadwell Systems

Haswell and Broadwell (Intel’s previous and current generations of x86) both introduced a range of new power saving states that promised significant improvements in battery life. Unfortunately, the typical experience on Linux was an increase in power…

Share

Linux Kernel 4.0.1 Officially Released, It’s Now the Most Advanced Version Available

The latest version of the stable Linux kernel, 4.0.1, has been released by Greg Kroah-Hartman, which is the first update for the most advanced available branch. Linux kernel 4.x is the latest branch released by Linus Torvalds, and it’s the most advan…

Share

WordPress promises patch for zero-day “within hours”

LinuxSecurity.com: Shortly after this article was posted, WordPress released version 4.2.1, flagging it as a critical update. Website owners are encouraged to update immediately, and automatic updates have started to roll out. More information is here.

Share

Details on WordPress Zero Day Disclosed

LinuxSecurity.com: WordPress security issues have for the most part involved a vulnerable plug-in, but a Finnish researcher has disclosed some details on a zero-day vulnerability he discovered in the WordPress 4.2 and earlier core engine that could lea…

Share

Google Provides Detailed Analysis of GitHub Attack Traffic

LinuxSecurity.com: The high-profile DDoS attack against GitHub that went on for several days last month was the end result of an operation that included several phases and extensive testing and optimization by the attackers. Researchers at Google analy…

Share

The Further Democratization of Stingray

LinuxSecurity.com: Stingray is the code name for an IMSI-catcher, which is basically a fake cell phone tower sold by Harris Corporation to various law enforcement agencies. (It’s actually just one of a series of devices with fish names — Amberjack is …

Share

Hacking Airplanes

LinuxSecurity.com: Imagine this: A terrorist hacks into a commercial airplane from the ground, takes over the controls from the pilots and flies the plane into the ground. It sounds like the plot of some “Die Hard” reboot, but it’s actually one of the …

Share

House Passes Cybersecurity Bill Despite Privacy Protests

LinuxSecurity.com: Congress is hellbent on passing a cybersecurity bill that can stop the wave of hacker breaches hitting American corporations. And they’re not letting the protests of a few dozen privacy and civil liberties organizations get in their …

Share

6 Most Dangerous New Attack Techniques in 2015

LinuxSecurity.com: Experts with the SANS Institute convened at RSA Conference for their annual threats panel, this time dishing on the six most dangerous new attack techniques. Led by SANS Director John Pescatore, the panel featured Ed Skoudis, SANS fa…

Share

Wi-Fi client vulnerability could expose Android, Linux, BSD, other systems to attacks

LinuxSecurity.com: A serious flaw in a component that’s used to authenticate clients on Wi-Fi networks could expose Android, Linux, BSD, and possibly Windows and Mac OS X systems to attacks. The vulnerability is in wpa_supplicant, an open-source softw…

Share

RSAC 2015: RSA Conference (Day 3)

LinuxSecurity.com: For me – today is part two of running the gauntlet with back-to-back meetings; for everyone else today is day three, easily described as the show’s apex. In other words, there’s a lot going on today at the conference, so we’ll start …

Share