Search

Results 1-20 of 36 for cybersecurity.
TECH BLOG

The Case Against Full-Disk Encryption

The information security industry, with all its raging debates, has rallied around a small corpus of best practices. One of the highest on this list is full-disk encryption, which security experts regard as sacrosanct. This is the encryption that ensures that someone who snatches your device won't b...

Abandoned Open Source Code Heightens Commercial Software Security Risks

Outdated or abandoned open source components are persistent in practically all commercial software, putting enterprise and consumer applications at risk from security issues, license compliance violations, and operational threats, concludes the Synopsys 2020 Open Source Security and Risk Analysis Re...

Unsigned Firmware Puts Windows, Linux Peripherals at Risk

Eclypsium has released new research that identifies and confirms unsigned firmware in WiFi adapters, USB hubs, trackpads and cameras used in Windows and Linux computer and server products from Lenovo, Dell, HP and other major manufacturers. Eclypsium also demonstrated a successful attack on a server...

OPINION

Should Discord Be in Your Incident Response Toolbox?

Cybersecurity incident response teams have choices when it comes to communication tools: Microsoft Teams, Slack, Zoom and numerous others. Some require a subscription or commercial license -- others are free. Some are niche tools specifically designed for incident response. Some are generic busines...

Linux Inside Azure Sphere on the Horizon

Azure Sphere will be generally available in Feb 2020, Microsoft announced at the IoT Solutions World Congress. Its scheduled arrival highlights Microsoft's readiness to fulfill its promise for better Internet of Things device security at scale, company officials said. Microsoft first introduced Azur...

LINUX PICKS AND PANS

Cryptocurrency OS Makes It Easy to Buy and Spend Digital Cash

If you are ready to jump into the digital world of a bitcoin economy, Cryptocurrency OS might be your most convenient way to fast-track your entry. Cryptocurrency OS is a specialty Linux distribution that serves a niche user market destined to grow as the crypto economy continues to develop. This di...

LINUX PICKS AND PANS

Deepin Linux: Security Threat or Safe to Use?

Open source operating systems in general are less worrisome because their code is open to inspection by anyone with the skills to understand it. Does that mean Linux computing platforms from nongovernmental sources in politically tense countries are equally worry-free? At least one situation last ye...

Open Source Flaw Management Shows Signs of Improvement: Report

Almost two years after the infamous Equifax breach, many organizations still struggle to identify and manage open source risk across their portfolios. Meanwhile, the latest report tracking open source security shows a 40 percent rise in the average number of open source components detected in each c...

Can Hackers Crack the Ivory Towers?

Just like leaders in every other field you can imagine, academics have been hard at work studying information security. Most fields aren't as replete with hackers as information security, though, and their contributions are felt much more strongly in the private sector than in academia. The differin...

WhiteSource Rolls Out New Open Source Security Detector

WhiteSource has launched its next-generation software composition analysis technology, dubbed "Effective Usage Analysis," with the promise that it can reduce open source vulnerability alerts by 70 percent. The newly developed technology provides details beyond which components are present in the app...

Open Source Is Everywhere and So Are Vulnerabilities, Says Black Duck Report

Black Duck by Synopsys has released the 2018 Open Source Security and Risk Analysis report, which details new concerns about software vulnerabilities amid a surge in the use of open source components in both proprietary and open source software. The report provides an in-depth look at the state of o...

The Internet Is Facing a Health Scare, Suggests Mozilla Report

Mozilla has launched the first full edition of its Internet Health Report. The report is "an open source effort to explore the state of human life on the Internet," said Mozilla Executive Director Mark Surman. It consists of research and analysis compiled by researchers, engineers, data scientists, ...

Zealot Loads Cryptocurrency Miner on Linux, Windows Machines

A new Apache Struts campaign that researchers named "Zealot" has come to light in recent weeks. Zealot loads Windows or Linux-based machines by installing a miner for Monero, which has become one of the hottest cryptocurrencies used in recent malware attacks. Zealot uses NSA-linked EternalBlue and E...

New Open Source Tools Test for VPN Leaks

ExpressVPN on Tuesday launched a suite of open source tools that let users test for vulnerabilities that can compromise privacy and security in virtual private networks. Released under an open source MIT License, they are the first-ever public tools to allow automated testing for leaks on VPNs, the ...

The Pirate Bay Takes Heat for Testing Monero Mining

The Pirate Bay has come under fire for testing a Monero javascript miner as a possible means for generating new revenue to replace its current model of making money through advertising on the site. It reportedly hijacked the processing power of its own users to help generate revenue. Monero is an o...

Millions of IoT devices are vulnerable to cybersecurity attacks due to a vulnerability initially discovered in remote security cameras, Senrio reported this week. The firm found the flaw in a security camera developed by Axis Communications, one of the world's biggest manufacturers of the devices. T...

IoT Fuels Growth of Linux Malware

Malware targeting Linux systems is growing, largely due to a proliferation of devices created to connect to the Internet of Things. That is one of the findings in a report WatchGuard Technologies released last week. The report, which analyzes data gathered from more than 26,000 appliances worldwide,...

OTA Report: Consumer Services Sites More Trustworthy Than .Gov Sites

The Online Trust Alliance on Tuesday released its 2017 Online Trust Audit & Honor Roll. Among its findings: Consumer services sites have the best combined security and privacy practices. FDIC 100 banks and U.S. government sites are the least trustworthy. The number of websites that qualified for the...

Capsule8 Launches Linux-Based Container Security Platform

Cybersecurity startup Capsule8 this week announced that it has raised $2.5 million to launch the industry's first container-aware, real-time threat protection platform designed to protect legacy and next-generation Linux infrastructures from existing and potential attacks. CEO John Viega, CTO Dino D...

SnapRoute Snags $25M With AT&T, Microsoft Backing

SnapRoute, a developer of open source networking software, announced that it has raised $25 million in Series A financing led by Norwest Venture Partners with new support from AT&T and Microsoft Ventures. SnapRoute, which was founded by CEO Jason Forrester and other former engineers from Apple, plan...

LinuxInsider Channels