Check your router now - it could be a huge Linux security risk
Did you know that your router could be the biggest security hole in your network?
Did you know that your router could be the biggest security hole in your network?
Have you heard that F5 has patched a severe security vulnerability in its BIG-IP product? The bug can be exploited by attackers over the Internet to gain access to the TMUI component, which runs on top of a Tomcat server on BIG-IP's Linux-based operating system.
Nvidia has released a set of security updates to remove six vulnerabilities in the Nvidia GPU Display Driver impacting both Linux and Windows machines.
Have you heard that VideoLAN has released a new version of VLC Media Player to resolve a critical security vulnerability that could eventually allow for remote code execution?
For the past two years, Intel CPUs have been under siege by an unending series of attacks that make it possible for cybercriminals to pluck passwords, encryption keys, and other secrets out of silicon-resident memory. New security research reveals that Intel's speculative execution flaws go deeper and are even harder to fix than we initially thought.
After much debate, Linus Torvalds has rejected a controversial patch to address potential leaks of secrets from a CPU's cores.
Have you heard about the cryptographic data leakage in Firefox's latest security update? It has now been fixed. Learn how to check if you have the update - and be sure to install it immediately if you do not.
A new fuzzing tool, USBFuzz, has identified 18 USB bugs impacting Linux. Eleven have already been patched.
Huawei has denied having any official involvement in an insecure patch submitted to the Linux kernel project over the weekend, which introduced a "trivially exploitable" vulnerability. According to the tech giant, an employee submitted code as part of a personal project, not on behalf of the company.
Security researchers have revealed that a vulnerability in almost all antivirus software platforms could have been exploited to disable anti-malware protection and turned into destructive tools.
Do you use Google Chrome as your web browser? Google has warned of yet more security vulnerabilities in Chrome 81, which was only launched three weeks ago.
IBM has admitted to making 'a process error, improper response' to a bug report that identified four vulnerabilities in its enterprise security software, and the tech giant plans to issue an advisory.
The rise in attacks on Linux in recent years is not due to problems with the Linux OS, but rather issues with individual accounts and poor administration. LinuxSecurity Founder Dave Wreski states: "Although it may be easy to blame the rise in attacks targeting Linux in recent years on security vulnerabilities in the operating system as a whole, this is simply not the truth. The majority of exploits on Linux systems can be attributed to misconfigured servers and poor administration."
Are you a Google Chrome user? Google has issued a warning of a vulnerability in its Chrome browser across Windows, Mac and Linux - urging users to upgrade to the latest version of the browser (81.0.4044.113).
The Mozilla Foundation has patched two zero-day flaws in its browser that could allow for remote code execution.
Do you use Google Chrome as your web browser? Google has patched high-security vulnerabilities in its Chrome browser, and is rolling out the newest Chrome browser version in the coming days.
The Linux 5.6 kernel has been released - but you probably want to hold off on this release if you use the Intel "IWLWIFI" WiFi driver. Learn why in an informative Phoronix article.
The adoption of open source bylarge enterpriseshas already witnessed its power and dependencies. The best example can’t be better than open-source Linux which made recent headlines such asIBM buyingRed Hat for $34-Billion andMicrosoft shipsfull Linux kernel in Windows 10.
Open Source vulnerabilities rose by nearly 50 percent in 2019 over the previous year, based on a report released Thursday.
The US-CERT has issued a security advisory warning users of a 17-year-old critical Remote Code Execution (RCE) vulnerability that affects PPP (Point to Point Protocol Daemon) daemon software implemented in almost all Linux based operating systems.