Security

Nearly 30,000 Macs have been infected with a new malware strain. Discovered by researchers at Red Canary, the malware has been sitting on it hosts waiting for a payload that never arrived. In a statement provided to TechNewsWorld, Apple said that upon discovering the malware, it revoked the certific...

As they become more prominent, consumers will enjoy shopping experiences that no longer rely on payments from a piece of plastic with a four-digit pin. Instead, consumers will use unique motion sensors in smartphone devices to passively authenticate people using their walking behavior and other cont...

Cyberattacks are increasing in frequency, ramping up the data privacy threats they pose to government agencies and businesses alike. Governments both domestic and foreign need to step up efforts to pass legislation that bolsters technological defenses this year, warn privacy groups. Stiffer privacy ...

This piece is a demonstration of one means of setting up file-level encryption which is widely available for Linux desktop users. To offer a similar encryption scheme to as many users as possible, we'll walk through how to use fscrypt to create an encrypted filesystem. While simple, fscrypt offers m...

The Linux Foundation on Monday announced the formation of the Open Source Security Foundation as the latest initiative to improve software security. This cross-industry collaboration brings together industry leaders to improve the security of open-source software by building a broader community with...

Rancher Labs and Fujitsu on Tuesday announced an alliance to hasten the adoption of Kubernetes container orchestration technology industry-wide, starting within public sector institutions in the U.K. and Ireland. The alliance was forged partly in response to the growing requirement by the U.K.'s Gov...

About 20 percent of the most popular Android Apps available through the Google Play Store contain open source components with known security vulnerabilities that can be exploited by hackers, according to a report Insignary will release next week.

A design flaw in all Intel chips produced in the last decade is responsible for a vulnerability that puts Linux, Windows and macOS-powered computers at risk, according to multiple press reports. The flaw reportedly is in the kernel that controls the chip performance, allowing commonly used programs ...

A Google code security researcher's recent discovery of 14 flaws in Linux kernel USB drivers led to last-minute fixes in the Linux 4.14 release candidate code set for distribution on Sunday. The flaws, which Google researcher Andrey Konovalov disclosed earlier this week, affect the Linux kernel befo...

Increased use of open source software could fortify U.S. election system security, according to former CIA head R. James Woolsey and Bash creator Brian J. Fox. The two made their case for open source elections software after security researchers demonstrated how easy it was to crack some election ma...

Microsoft has released its long-awaited cloud-based bug detection tool, previously code-named "Project Springfield." The Windows version became generally available, and a new Linux version became available as a preview last week. The tool, Microsoft Security Risk Detection, uses artificial intellige...

Google last week released its E2EMail encryption code to open source as a way of pushing development of the technology. "Google has been criticized over the amount of time and seeming lack of progress it has made in E2EMail encryption, so open sourcing the code could help the project proceed more qu...

The Linux operating system started out as an alternative to other platform architectures in use on mainframes and enterprise back-ends. It has grown into a major mainstream computing platform.

Consumers' understanding of what encryption does apparently doesn't determine whether they use the technology, with iPhone owners much more likely to use encryption than Android users.

LinuxInsider Channels