Search

Results 81-100 of 181 for hacker.

There’s a GHOST in Linux’s Library

Patches for GHOST, a critical vulnerability in glibc, the Linux GNU C Library, now are available through vendor communities for a variety of Linux server and desktop distributions. Qualys earlier this week reported its discovery of GHOST, a vulnerability that allows attackers to remotely take contro...

Hacker Gives Google a Hand With Chrome-Android Compatibility

An unplanned convergence of Android apps and the Chrome OS may be setting the stage for a wide-open cross-platform architecture that combines Android and Chrome. Freelance programmer Vlad Filippov, aka "Vladikoff," discovered a way around Google's limitations on its ARC, or App Runtime for Chrome, w...

The Connected Car, Part 3: No Shortcuts to Security

The connected car is becoming a reality, but the gadget-filled roadways it travels will be paved with several options for in-car technologies. These choices pose challenges for carmakers. Whichever technology wins the race, one of the biggest concerns for OEMs is their electronic security. The Linux...

The Novena Open Hardware Laptop: A Hacker’s Dream Machine

Would you buy a high-end laptop built completely around open hardware and the Linux distro of your choice? Novena offers that opportunity, but it comes with an out-of-the-box experience that might be beyond the reach of the typical computer consumer. That said, the Novena laptop's experimental techn...

Researchers Find Android Security on Par With iOS

The open source Android operating system long has been considered by security experts to be the mobile OS most vulnerable to security threats, but iOS is just as vulnerable, Marble Security has found. However, the two OSes expose users to different types of threats. The perceived greater security of...

FOSS Community Hustles to Fix Gaping Heartbleed Flaw

A flaw in OpenSSL that has been around since 2011, the Heartbleed Bug, lets hackers steal information protected by the SSL/TLS encryption used to secure the Internet. Codenomics, which co-discovered the flaw at about the same time as Google's Neel Mehta, tested some of its own services and found it ...

WhatsApp Flaw Opens Database Doors to Hackers

An Android developer's disclosure that it's possible to hack into the WhatsApp database and read the text of the chats from another application could be a big headache for Facebook, which has agreed to purchase the app for $19 billion. "This is not a bug, but a design decision of WhatsApp," said Bas...

The Rise of the Ethical Hacktivist

When Saul Alinsky wrote Rules for Radicals more than four decades ago, the world was a very different place than it is today. Protests and demonstrations were among the most common tactics for bringing about social change, and they were used on such a broad scale that they helped define the...

BOOK REVIEW

‘Makers at Work’ Offers Inspiring Journey Through the Creative Process

The maker mentality has no starting point in modern history. People have always honed their creative skills to make things, and societies have always had visionaries who turned their garage hobbies and kitchen table inventiveness into industrial breakthroughs. Today, the maker mentality is essential...

EXCLUSIVE INTERVIEW

AlienVault’s Barmak Meftah: Time to Put Hackers on the Defensive

As CEO of AlienVault, Barmak Meftah faces enemies every day who play out their attacks from faraway lands using seemingly unbeatable weapons. One of the weapons AlienVault uses with the support of the open source community is a global report called the Open Threat Exchange that tracks threats to com...

LINUX PICKS AND PANS

OpenPGP Studio Keeps Prying Eyes Off Your Personal Data

GoAnywhere OpenPGP Studio is an easy-to-use, cross-platform desktop tool by Linoma Software that protects files using the OpenPGP encryption standard. Why opt for this relative newcomer instead of other, more mature open standards-based encryption solutions? If for no other reason, OpenPGP Studio is...

EXCLUSIVE INTERVIEW

Shutterstock’s Chris Fischer: Making the Most of Open Source’s ‘Huge Tech Edge’

Shutterstock has a nearly insatiable appetite for data storage. From its inception, the company -- a global provider of licensed photographs, vectors, illustrations and videos -- refused to pay higher prices just to stuff its storage needs into somebody else's cloud. Instead, the almost 10-year-old ...

The Windows Kernel’s Achilles’ Heel

Life is like a roller coaster, as the popular saying goes, filled with both ups and downs. Here in the Linux blogosphere we've certainly experienced our share of downs in recent months -- thanks in large part to a frustrating spate of FUD -- but lately the clouds have parted and the sun is shining o...

Lame U/P Combos Make WordPress Irresistible to Hackers

An attack of unprecedented proportions has been hitting sites using WordPress, a free and open source blogging tool and content management system that powers more than 60 million websites worldwide. Attacks have been launched from more than 90,000 IP addresses, according to HostGator. CloudFlare sai...

EXCLUSIVE INTERVIEW

Fedora Project’s Robyn Bergeron: The Linux Desktop Is Almost Ready for Its Close-Up

The Fedora Project is perhaps one of the hallmark Linux distributions. Fedora is sponsored by Red Hat, the commercial developer of Red Hat Enterprise Linux (RHEL). Red Hat's investment in the Fedora community is collaborative. As such, Fedora Linux releases often provide RHEL developers with a field...

Analyst: Flame Devs Used FOSS to Help Them Hide

The developers of the now-notorious Flame malware used command and control servers running the 64-bit version of Debian and the OpenVz virtualization technology in their work. They wrote most of the server code in PHP, researchers at Kaspersky Lab and Symantec have found during continuing investigat...

Power Strip’s a Penetration Testing Tool in Disguise

Advanced penetration testing product maker Pwnie Express has unveiled a new tester that looks just like a power strip. The Power Pwn is a fully integrated enterprise-class device that can be used over Ethernet, wireless or Bluetooth connections. It is priced at $1,300 and is currently available for ...

Security Gurus: Jelly Bean Is Super Chewy

The latest version of Google's Android mobile operating system, Jelly Bean, is much harder to hack than its predecessors, according to research from Duo Security. Google beefed up security for Jelly Bean significantly, said Jon Oberheide, security researcher at Duo. The OS will come with an updated ...

Android Botnet May Be Spewing Spam

An international botnet could be using infected Android handsets to send out massive amounts of spam, said Microsoft antispam engineer Terry Zink. He reportedly identified the botnet and its Google Android connection by examining the headers of spam that included the signature "Sent from Yahoo! Mail...

BOOK REVIEW

Linux Admin Manual Is a Great Reference Tool That’s Not for Dummies

Linux Administration: A Beginner's Guide by Wale Soyinka is a hands-on manual for IT staffers who must dance with Windows and Linux. It is a practical guide for network admins who deploy and maintain Linux and other free and open source software. In this Sixth Edition opus, Soyinka provides...

LinuxInsider Channels