Feed aggregator

Ardour 5.9 released

Reddit - Mon, 2017-05-15 23:24

Security Leftovers

TuxMachines - Mon, 2017-05-15 23:24
  • Out-of-Control CIA Continues to be Exposed in WikiLeaks’ Vault 7

    After installing a small file, the operators would then be able to instruct the computer to kill any use of a web browser on a set schedule. For instance, the software could be instructed to shut down Firefox every 25-35 seconds. Similarly, the example included a measure to “lock up” PowerPoint files 10 minutes after they were loaded. It would also allow operators to create a delay when PowerPoint files were attempting to load.

    While the examples they used are simple and relatively harmless, the software could perform virtually any assigned task. Because the data is encrypted with a key stored outside of the machine, the code would be extremely difficult to detect and/or decipher.

    After installing the software, the documentation instructs users to “kick back” and “Relax – After Midnight will take care of the rest.”

    The second piece of software detailed is similar to “AfterMidnight” and is called “Assassin.” That piece of software is a relatively simple way of collecting data remotely and then delivering results to a listening post on a schedule.

    Through screenshots in the documents, it can be seen that the author is named “Justin,” is working from a Dell computer, and desktop shortcuts to an encrypted chat program called ‘Pidgin,’ as well as a folder entitled “drone.”

  • Global ‘Wana’ Ransomware Outbreak Earned Perpetrators $26,000 So Far

    However, I find it depressing to think of the massive financial damage likely wrought by this ransom campaign in exchange for such a comparatively small reward. It’s particularly galling because this attack potentially endangered the lives of many.

  • Ransomware: Microsoft can no longer claim to be 'proactive'

    Microsoft's reaction to the Windows ransomware crisis that occurred on Friday and Saturday has shown one thing: no longer can the company continue to use the business buzzword "proactive" when it talks about itself. It was caught unawares and left looking very old and tired in the way it responded to the situation.

  • Cyber attack: Hackers {sic} in China try to seize control of WannaCry ransomware's 'kill switch'

    “What you can follow is the money,” Mr Raiu said. “You can follow the Bitcoins [although] following the Bitcoins is kind of an art in itself.”

  • [Old] The Software Industry IS the Problem

    The question is how to introduce product liability, because just imposing it would instantly shut down any and all software houses with just a hint of a risk management function on their organizational charts.

  • [Old] Why Not Use Port Knocking?

    The robots currently at work knocking around for your guessable password could easily be repurposed to guess your Unicode password currently known as your port knocking sequence, and quite likely have been already.

read more

How to Install Mantis Bug Tracker on CentOS 7

LXer - Mon, 2017-05-15 23:22
Mantis is a free and open source issue tracker written in PHP language. It provides an easy to use web interface for tracking your applications. You can easily manage project and track your application bugs using Mantis. This tutorial shows how to install Mantis Bug Tracker on CentOS 7 server.

LWJGL v3.1.2 Brings OpenVR Bindings, Tiny OpenEXR

Phoronix - Mon, 2017-05-15 23:16
Released today was LWJGL 3.1.2, the popular Lightweight Java Game Library initiative that exposes high-performance, cross-platform libraries for game/multimedia use-cases. LWJGL continues to offer OpenGL, Vulkan, OpenCL, and other bindings with some new additions coming in this most recent release...

Pages

Subscribe to LinuxInsight aggregator