Revelations about the PRISM project involve US tech companies that have been compelled to provide special assistance to US intelligence agencies. Will secret arrangements between tech companies and US intelligence affect how independent security researchers disclose vulnerabilities?
Read more »Has the NSA "poisoned the well" for responsible disclosure?
Category: Philosophy Tags:
- Login to post comments
WPA2 is vulnerable (hole196)
Do you think your wireless communications are secure? Think again. There is a vulnerability built into the WPA2 protocol itself! It's based on abusing the GTK (Group Temporal Key) and can be used to create man-in-the-middle and denial-of-service attacks. Too few people know this.
Read more »Category: High End Tags:
- Login to post comments
Kaspersky study finds Adobe software is biggest security risk
Before casually clicking on that "Install Adobe Flash Player/Reader" button, think twice. Then don't do it! You'll be inviting every cracker and his dog to invade your network.
Read more »- Login to post comments
Remote Exim Exploit In the Wild
The news comes on the exim mailing list, where a user posted that he had his exim install hacked via remote exploit giving the attacker the privilege of the mailnull user, which can lead to other possible attacks. A note up at the Internet Storm Center reminds exim users how to set up to run in unprivileged mode, and a commenter includes recompile instructions for Debian exim for added safety.
Read more »Category: High End Tags:
- Login to post comments
Damn Vulnerable Linux
Damn Vulnerable Linux – The most vulnerable and exploitable operating system ever! Damn Vulnerable Linux is the most complete training environment for IT security with over 500.000 downloads. It includes all tools you need ready to go. Additionally tons of training material and exercises are included.
Read more »LinuxCon: Exploits Show Why Linux Is Vulnerable
There is a widely held belief that Linux is a completely secure operating system. But to Brad Spengler of the grsecurity project, the belief is far from accurate. And he has the kernel exploits to prove it.
Read more »Category: High End Tags:
- Login to post comments
RSA Authentication Weakness Discovered
The most common digital security technique used to protect both media copyright and Internet communications has a major weakness, University of Michigan computer scientists have discovered.
Read more »Category: High End Tags:
- Login to post comments
sudo vulnerabilities
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS Ubuntu 8.04 LTS Ubuntu 8.10 Ubuntu 9.04 Ubuntu 9.10
- Login to post comments
10 Kernel Vulnerabilities in Ubuntu 6.06, 8.04, 8.10, 9.04 and 9.10
Canonical announced a few hours ago the immediate availability of a new Linux kernel security update for the following Ubuntu distributions: 6.06 LTS (Dapper Drake), 8.04 LTS (Hardy Heron), 8.10 (Intrepid Ibex), 9.04 (Jaunty Jackalope) and 9.10 (Karmic Koala).
Read more »Category: End User Tags:
FreeBSD bug gives untrusted root access
A security bug in the latest version of the FreeBSD can be exploited to grant unprivileged users complete control over the operating system, a German researcher said Monday.
Read more »Category: High End Tags:
- Login to post comments
Vulnerability in the GIMP image editing tool
According to security services provide Secunia, a vulnerability in the free image editing tool GIMP (GNU Image Manipulation Program) can potentially be exploited to compromise a users system.
Read more »Category: High End Tags:
- Login to post comments
FreeBSD Local Root Escalation Vulnerability
It’s been a long time since we’ve heard about a problem with FreeBSD, partially because the mass of people using it isn’t that large and secondly because BSD tends to be pretty secure as operating systems go.
Read more »Category: High End Tags:
- Login to post comments
Mozilla patches 'critical' Firefox flaws
As part of Mozilla’s ongoing stability and security update process, Firefox 3.5.2 and Firefox 3.0.13 are now available for Windows, Mac, and Linux as free downloads
Read more »Category: End User Tags:
- Login to post comments
Top FOSS security vulnerabilities
Palamida, the San Francisco company that helps companies to audit their use of open source software, has released a list of what it calls "the top five most overlooked open source vulnerabilities." To this list, Palamida has added an additional five vulnerabilities exclusively for Linux.com.
Read more »Category: High End Tags:
- Login to post comments
Researcher publishes attack code for Mozilla flaw
Mozilla is working on patching its Firefox browser after a hacker posted details of a flaw that could let criminals run unauthorized software on a victim's machine.
Read more »Category: End User Tags:
- Login to post comments