Security

Cybersecurity researchers uncovered a vicious new threat that hides as legitimate systems software. With Linux kernel 5.12 you can update firmware, no reboot required. The last refinement in LibreOffice 7 series paves the way for a new set of features when Series 8 arrives. If that is not enough to ...

Cybercriminals in 2022 will move from identity theft to identity fraud, predicted the Identity Theft Resource Center. Bad actors are accumulating personal identifying information, but they're not using it to target consumers as much as they used to do. Rather, they're using it in credential attacks ...

This nasty software bug has much of the IT world in a panic as it follows us into the New Year. No doubt, many organizations and SMBs with no IT staff are clueless about its existence. But ignorance of Log4j only makes them more susceptible to an attack. They remain defenseless.

Four out of five cybersecurity pros are fretting over the potential for a sneak attack by an adversary with a quantum computer that will render the encryption on their data ineffective. Quantum computers can process data much faster than most computers today because they use qubits to crunch data, w...

New research from cloud security firm Ermetic shows that nearly all businesses have identities that, if compromised, would place at least 90 percent of the S3 buckets in their AWS account at risk. Ermetic conducted the study to determine the circumstances that would allow ransomware to make its way ...

The Finland-based security consultancy discovered vulnerabilities affecting over 150 different HP multifunction printer products. Attackers can exploit the flaws to seize control of devices, steal information, and further infiltrate networks to inflict other types of damage, according to F-Secure's ...

'Tis the season to go phishing. Nothing brings out digital bandits like the holidays, and this year is no exception. Proofpoint, an enterprise digital security company, reports its researchers are seeing a massive global increase in holiday-themed mobile phishing attacks, a.k.a. smishing. It noted t...

Over the last year, ethical hackers have prevented more than US$27 billion in cybercrime, according to a report by a leading bug bounty platform. In its annual Inside the Mind of a Hacker report, Bugcrowd maintained that ethical hackers working on its platform were able to prevent those cybercrime l...

Entrepreneurs might well be the latest heroes in cyberwarfare. Despite increasing odds of malicious attacks, SMB owners are forging ahead with a newfound sense of security. Untangle's fourth annual SMB IT Security Report shows that SMBs have adapted to a changing work environment, addressed an influ...

Today LinuxInsider introduces a bimonthly news column to summarize some of the Linux and open-source consumer and enterprise events scattered around the Linux Sphere. Look forward to an assortment of topics that will keep Linux users and open-source supporters up to speed with new developments.

While migration to the cloud is at an all-time high, so is the growth of ransomware peddlers. Veritas Technologies surveyed more than 2,000 global IT leaders whose organizations have undertaken pandemic-led digital transformation. The study found the majority are severely vulnerable to ransomware at...

Item tracker maker Tile refreshed its product line Tuesday and announced it will be introducing a new ultra-wideband product in 2022. "With a longer finding range, louder ring and voice-enabled finding through Amazon Alexa and Google Assistant, we're making it even easier for people to quickly find ...

Shadow code -- third-party scripts and libraries often added to web applications without security validation -- pose risks to websites and jeopardize compliance with privacy regulations, according to new research conducted by Osterman Research for PerimeterX. Third-party code leaves organizations vu...

Backed by many of the world's largest companies for more than a decade, the Software Package Data Exchange specification is now an internationally recognized ISO/IEC JTC 1 standard. This comes during a transformational time for software and supply chain security. The Linux Foundation announced Thur...

LinuxInsider Channels