Home Tags Linux

Tag: linux

‘Stack Clash’ Smashed Security Fix in Linux

Linux, OpenBSD, Free BSD, Solaris security updates available to thwart newly discovered attack by researchers.

Stack Clash vulnerabilities smash Linux defenses in the quest for root...

The serious chain of bugs can be used to compromise Linux, FreeBSD, OpenBSD, and Solaris.

Stack Clash flaws blow local root holes in loads of top...

We knew about this in 2005.

And 2010.

And people are still building without -fstack-check Powerful programs run daily by users of Linux and other flavors of Unix are riddled with holes that can be exploited by logged-in miscreants to gain root privileges, researchers at Qualys have warned.…

Web host agrees to pay $1m after it’s hit by Linux-targeting...

Windfall payment by poorly secured host is likely to inspire new ransomware attacks.

12-year-old security hole in Unix-based OSes isn’t plugged after all

“Stack Clashrdquo; poses threat to Linux, FreeBSD, OpenBSD, and other OSes.

Stack Clash Vulnerability in Linux, BSD Systems Enables Root Access

Patches are available for a newly discovered Linux, BSD and Solaris vulnerability called Stack Clash that bypasses stack guard-page mitigations and enables root access.

How to install Linux on a Chromebook (and why you should)

Crouton and Gallium OS turn Chromebooks into Linux laptops.

Honeypots and the Internet of Things

According to Gartner, there are currently over 6 billion IoT devices on the planet. Such a huge number of potentially vulnerable gadgets could not possibly go unnoticed by cybercriminals. As of May 2017, Kaspersky Lab’s collections included several thousand different malware samples for IoT devices, about half of which were detected in 2017.

Advanced CIA firmware has been infecting Wi-Fi routers for years

Latest Vault7 release exposes network-spying operation CIA kept secret since 2007.

9 shell tips every developer should know

The shell is your friend. But many developers don’t really know the shell, the Unix or Linux command-line environment available in several operating systems. (Bash is the best known, but there are others.)Some of you, when you transitioned from Windows to Mac, took your (slow) clickety habits with you, not realizing that the power laid in that app called Terminal hidden under Applications somewhere. Some of you have been shelling into “the server” to tweak a setting or two without realizing that you could automate your life away without even cracking a devops tool.[ Discover the power of Bash on Windows. | The power of PowerShell: PowerShell intro for Windows Server admins • PowerShell intro for Exchange admins • Essential PowerShell scripts for security admins • All about PowerShell providers and modules. | Keep up with hot topics in programming with InfoWorld's App Dev Report newsletter. ]Whatever brought you to the shell, chances are you’re not using it to its full advantage. Here are my top nine tricks for doing so:To read this article in full or to leave a comment, please click here

​How to use Linux’s built-in USB attack protection

Worried over malicious USB sticks? Linux has you covered with USBGuard.

Tails OS hits version 3.0, matches Debian’s pace but bins 32-bit...

Edward Snowden's preferred-for-privacy OS gets a decent upgrade The developers of privacy-protecting Linux distribution Tails have decided to get closer to Debian with the project's 3.0 release.…