Search

Results 51-60 of 110 for cybersecurity.

Report: 3.5 Million HTTPS Servers Vulnerable to DROWN

A report released Tuesday on the DROWN vulnerability raises concerns about possible attacks that could expose encrypted communications. DROWN is a serious vulnerability that affects HTTPS and other services using SSL version 2, according to the team of security researchers who compiled the report. T...

OpenSSH Flaw Could Leak Crypto Keys

Qualys on Thursday reported a flaw in the OpenSSH client that could let a hacker steal the client's private crypto keys. The bug is the result of an undocumented feature called "roaming" that exists in version 5.4, released March 8, 2010, and above. It's one of two vulnerabilities that a malicious S...

Black Duck Intros Container Scanning

Black Duck Software on Tuesday announced it has added to its Hub software container-scanning capabilities that let users map open source security flaws for applications, Linux distros, and other software in Docker and other Linux containers. Adding a containerized scanner to a Docker host enables au...

Backspace Flaw Enables Linux Zero-Day Attack

Researchers last week revealed a zero-day flaw that lets attackers take over a Linux system by pressing the backspace key repeatedly. Pressing backspace 17 to 20 times will overwrite the highest byte of the return address of the grub_memset() function, ultimately causing a reboot by redirecting cont...

Google Opens Floodgates for TensorFlow Development

Google on Monday announced the release of TensorFlow, its second-generation machine learning system, to the open source community. It's offering TensorFlow as a standalone library with associated tools, tutorials and examples under the Apache 2.0 license. Google uses TensorFlow in deep learning, Goo...

Canonical Plays With Internet of Toys Idea

Canonical last week announced plans to launch the Internet of Toys, an open source initiative calling on toy makers, hackers, Internet of Things fans and innovators to build the next generation of Web-accessing toys. Participants will build the next generation of toys around open source tools such a...

Another Day, Another Billion Android Users at Risk

Google on Monday released an over-the-air update for Nexus devices, which includes patches for the latest Stagefright vulnerabilities and other flaws. Android's Stagefright media processing feature, which recently imperiled 1 billion devices around the world, was once again putting them at risk, Zim...

EXCLUSIVE INTERVIEW

SDF Cofounder Chris Davis: Bad Guys Will Need a New M.O.

In the war against malware, a new strategy is taking shape. The good guys are preparing to demolish the bad guys' most effective weapons: rogue websites. The Secure Domain Foundation will tackle the identification and prevention of Internet cybercrime through a series of steps designed to interfere ...

The Rise of the Ethical Hacktivist

When Saul Alinsky wrote Rules for Radicals more than four decades ago, the world was a very different place than it is today. Protests and demonstrations were among the most common tactics for bringing about social change, and they were used on such a broad scale that they helped define the...

That Was the Breach That Was

A series of intrusions into the heart of the Linux Kernel.org servers in late August that went undetected for some 17 days is still shrouded in mystery. If Linux developers know how the breach occurred, they are not saying. They also are keeping mum on the extent of any damage the break-in caused. T...

LinuxInsider Channels