Linux doesn't BSoD. It has oopses and panics instead. (We show you how to make a kernel module to explore further.)
Read moreSerious Security: How to improve cryptography, resist supply chain attacks, and handle data breaches
January 4 2023Lessons for us all: improve cryptography, fight cybercrime, own your supply chain... and don't steal my data and then pretend you're sorry.
Read moreThe bad news: the crooks have your SSH private keys. The good news: only users of the "nightly" build were affected.
Read moreNew Linux Cryptomining Malware
September 12 2022It’s pretty nasty:
The malware was dubbed “Shikitega” for its extensive use of the popular Shikata Ga Nai polymorphic encoder, which allows the malware to “mutate” its code...
Read more
Symbiote Backdoor in Linux
June 22 2022What makes Symbiote different from other Linux malware that we usually come across, is that it needs to infect other running processes to inflict damage on infected machines....
Read more
Linux Improves Its Random Number Generator
March 24 2022In kernel version 5.17, both /dev/random and /dev/urandom have been replaced with a new — identical — algorithm based on the BLAKE2 hash function, which is an excellent security...
Read moreLatest episode - listen now!
Read moreEven read-only files can be written to, leading to a dangerously general purpose elevation-of-privilege attack.
Read moreThis bug is fiendishly hard to exploit - but if you patch, it won't be there to exploit at all.
Read moreTwelve-Year-Old Linux Vulnerability Discovered and Patched
January 31 2022It’s a privilege escalation vulnerability:
Linux users on Tuesday got a major dose of bad news — a 12-year-old vulnerability in a system tool called Polkit gives attackers unfettered...
Read more
Recent Comments