Search

Results 41-60 of 188 for hacker.

New Open Source Initiative Consolidates Security Goals

The Linux Foundation on Monday announced the formation of the Open Source Security Foundation as the latest initiative to improve software security. This cross-industry collaboration brings together industry leaders to improve the security of open-source software by building a broader community with...

B0r0nt0K Ransomware Threatens Linux Servers

A new cryptovirus called "B0r0nt0K" has been putting Linux and possibly Windows Web servers at risk of encrypting all of the infected domain's files. The new ransomware threat and the ransom of 20 bitcoins -- about $75,000 -- first came to light last week in a forum post. A client's website had all ...

EXPERT ADVICE

Breaking Up the Crypto-Criminal Bar Brawl

As if e-commerce companies didn't have enough problems with transacting securely and defending against things like fraud, another avalanche of security problems -- like cryptojacking, the act of illegally mining cryptocurrency on your end servers -- has begun. We've also seen a rise in digital credi...

The Road Ahead for Open Source

Linux and the open source business model are far different today than many of the early developers might have hoped. Neither can claim a rags-to-riches story. Rather, their growth cycles have been a series of hit-or-miss milestones. The Linux desktop has yet to find a home on the majority of consume...

Google Shows Off New Android Dev Tools

Google has announced support for a range of new Android tools for application developers, chief among them the creation of a new support category for foldable devices. After years of speculation, it finally looks as though foldable screen smartphones are headed to market. Google's dev announcement f...

The Future of Open Source

The Linux desktop has yet to find a home on the majority of consumer and enterprise computers. However, Linux-powered technology has long ruled the Internet and conquered the cloud and Internet of Things deployments. Both Linux and free open source licensing have dominated in other ways.

Android Apps Riskier Than Ever: Report

Widespread use of unpatched open source code in the most popular Android apps distributed by Google Play has caused significant security vulnerabilities, suggests an American Consumer Institute report. Thirty-two percent -- or 105 apps out of 330 of the most popular apps in 16 categories sampled -- ...

Can Hackers Crack the Ivory Towers?

Just like leaders in every other field you can imagine, academics have been hard at work studying information security. Most fields aren't as replete with hackers as information security, though, and their contributions are felt much more strongly in the private sector than in academia. The differin...

DevOps: Plenty of Devs, Not Enough Ops

In spite of all the high-profile breaches that seem to sweep the headlines with greater frequency, companies slowly but surely have been getting a handle on internal security practices. At this point, it's hard to imagine any employee, in or out of the tech sector, who hasn't been run through antiph...

WhiteSource Rolls Out New Open Source Security Detector

WhiteSource has launched its next-generation software composition analysis technology, dubbed "Effective Usage Analysis," with the promise that it can reduce open source vulnerability alerts by 70 percent. The newly developed technology provides details beyond which components are present in the app...

Vulnerabilities Abound in Popular Android Apps: Report

About 20 percent of the most popular Android Apps available through the Google Play Store contain open source components with known security vulnerabilities that can be exploited by hackers, according to a report Insignary will release next week.

WiFi Routers Riddled With Holes: Report

Most WiFi router vendors have not patched numerous firmware vulnerabilities discovered more than two years ago, according to a report released Tuesday. OEM firmware built into WiFi routers use open source components that contain numerous known security vulnerabilities that can be exploited by hacker...

Zealot Loads Cryptocurrency Miner on Linux, Windows Machines

A new Apache Struts campaign that researchers named "Zealot" has come to light in recent weeks. Zealot loads Windows or Linux-based machines by installing a miner for Monero, which has become one of the hottest cryptocurrencies used in recent malware attacks. Zealot uses NSA-linked EternalBlue and E...

RoboCyberWall Aims to Block Linux Server Hacks

RoboCyberWall has launched its proprietary precision firewall solution bearing the same name. RoboCyberWall is designed to protect HTTP and HTTPS ports on Linux-based Apache2 and NGINX Web servers. The patent-pending firewall blocks all known exploits and zero-day attacks on Apache2 and NGINX Web se...

OPINION

Linux: Come for the Kernel, Stay for the Popcorn

Linux offers so much for users to sink their teeth into that even among desktop and more casual users, it's easy to get caught up in the tradecraft. It's only too tempting to put your system's technical capabilities to the test by trying out a new program or practicing a new command. As with any oth...

IBM Touts Top-Notch Security in Next-Gen Linux Mainframe

IBM on Tuesday launched LinuxOne Emperor II, the second generation of its open source mainframe computer system. The new model has a layer of security and privacy not seen in a Linux-based platform before, the company said. "We saw in our success stories for Emperor that security was a recurring the...

Apache Mounts Strong Defense, Equifax Retreats

The Apache Software Foundation has responded to accusations that the massive data breach Equifax disclosed last week resulted from a flaw in Apache's open source code. One of the largest financial data breaches in U.S. history, it exposed names, addresses, Social Security Numbers, birth dates, drive...

Next US Elections: Open Source vs. Commercial Software?

San Francisco in January could become the first U.S. city to adopt open source software to run its voting machines. City officials last month authorized consulting group Slalom to prepare a report on the benefits and challenges involved in using an open source voting machine platform. The city voted...

Is the Path to Secure Elections Paved With Open Source Code?

Increased use of open source software could fortify U.S. election system security, according to former CIA head R. James Woolsey and Bash creator Brian J. Fox. The two made their case for open source elections software after security researchers demonstrated how easy it was to crack some election ma...

IoT Fuels Growth of Linux Malware

Malware targeting Linux systems is growing, largely due to a proliferation of devices created to connect to the Internet of Things. That is one of the findings in a report WatchGuard Technologies released last week. The report, which analyzes data gathered from more than 26,000 appliances worldwide,...

LinuxInsider Channels