Browsing tag

Linux

8 Linux Kernel Vulnerabilities Patched In Ubuntu 16.04 LTS, Update Now

Short Bytes: Canonical has released a new update for Ubuntu 16.04 LTS operating system, its official flavors, and derivates. This update covers fixes for 8 vulnerabilities found in the Linux kernel. For a secure computing experience, users are advised to update their Linux machines as soon as possible. Earlier in July, Canonical released Ubuntu 16.04.1, the […]

10 Things To Do With An Old Computer And Laptop

Short Bytes: Electronic waste is becoming a very big problem, especially with the commoditization of computers of all kinds. Many people have an old computer sitting in a closet or in their basement. Some of us have many. They might be old, but there are many things we can do with them. Here are the […]

Linux.PNScan Trojan is back to compromise routers and install backdoors

The Linux Trojan Linux.PNScan is back and it is actively targeting routers based on x86 Linux in an attempt to install backdoors on them. Yesterday I wrote about a new Linux Trojan dubbed Linux.Rex.1, a new Linux malware that is capable of self-spreading and creating a peer-to-peer botnet, now experts from Malware Must Die discovered a new strain […]

Linux Meets Windows — Linus Torvalds Happily Talking To Microsoft Guys At LinuxCon

Short Bytes: Linux just completed its 25 years. At the ongoing LinuxCon tech conference, different tech companies and open source leaders are celebrating this occasion. At the conference, Linux creator Linus Torvalds was spotted at Microsoft’s booth, chatting and smiling with Redmond folks.  Years ago, former Microsoft CEO Steve Ballmer called Linux a “Cancer”. Back […]

How To Become a Certified Ethical Hacker

How To Become Certified Ethical Hacker? Today many businesses and government-related organizations that are serious about their network security. So they hire certified hackers and penetration testers to help probe and improve their networks, applications, and other computer systems.With the ultimate goal of preventing data theft and fraud from that black hat and other hackers.  So […]

New Trojan Turns Linux Devices into Botnet

New Linux Trojan turns infected Linux Devices and websites into P2P botnets and threatens users with DDoS and ransom! — This Trojan is one of its kind! Linux is considered as one of the most secure operating systems but things seem to be changing as cyber criminals are equipping themselves with the latest tools. That’s why […]

10 Most Dangerous Linux Commands You Should Never Run

Short Bytes: The internet has long been inhabited by tricksters, no-good-doers, and what are now known colloquially as trolls. We’ve all seen the too common forum post asking for help where someone insists that deleting the “system32” file is the sure-fire way of remedying the problem. Less known are the Linux analogues and we are […]

Lets Hack Linux Systems

Linux is the most widely used server operating system especially for web servers. It is open source; this means anybody can have access to the source code. This makes it less secure compared to other operating systems as attackers can study the source code to find vulnerabilities. Hack Linux Systems is about exploiting these vulnerabilities […]

After Linux, TCP Exploit Expandable to 80% of Android Devices

A couple of days ago researchers exposed a Linux flaw allowing hackers to hijack Internet traffic — Now it’s been discovered that the flaw also affects 80% of Android devices! The university of California, Riverside researchers along with the US Army Research Lab has recently announced the presence of a TCP vulnerability in Linux based […]

Linux TCP Flaw Leaves 80% Android Phones Open To Spying

Short Bytes: Last week, we reported about the serious TCP flaw in Linux kernel that can hijack Linux devices in 60 seconds. Now, according to a report by security firm Lookout, the same flaw also affects around 1.4 billion Android devices. It’s expected that Google will release a fix for the same in the upcoming Android […]

Linux bug leaves 1.4 billion Android users vulnerable to hijacking attacks

Off-path attack means malicious hackers can be located anywhere on the Internet. An estimated 80 percent of Android phones contain a recently discovered vulnerability that allows attackers to terminate connections and, if the connections aren’t encrypted, inject malicious code or content into the parties’ communications, researchers from mobile security firm Lookout said Monday. As Ars reported […]

It’s Confirmed: Linux Kernel 4.9 Will Be The Next LTS Kernel Branch

Short Bytes: It has been confirmed that Linux kernel 4.9 release will be the next LTS kernel branch. This Long Term Release is expected to receive fixes and updates for a couple of years. If everything goes as expected, kernel 4.9 will arrive towards the end of November 2016. Linux kernel developer and maintainer Greg […]

Linux.lady — This Trojan Converts Linux Servers Into Bitcoin Mining Monsters

Short Bytes: Named Linux.lady, a new trojan has been reported by Russian anti-virus firm Dr. Web. This malware attacks a poorly configured Redis server and turns it into a bitcoin miner for the attacker’s benefit. This trojan spreads on its own by infecting the other computers on the network. A new trojan has been discovered […]

Your Linux Distro Can Be Hacked In 60 Seconds Due To Serious TCP Flaw: Research

Short Bytes: Researchers have found a critical flaw that affects all Linux kernel version 3.6 and beyond. If left unnoticed, this flaw allows a range of harmful blind off-path TCP attacks that can compromise the security of a Linux user with a success rate of 90%. The researchers have proposed certain changes and implementation of a […]

Linux bug leaves USA Today, other top sites vulnerable to serious hijacking attacks

“Off-path” attack means hackers can be anywhere with no man-in-the-middle needed. Computer scientists have discovered a serious Internet vulnerability that allows attackers to terminate connections between virtually any two parties and, if the connections aren’t encrypted, inject malicious code or content into the parties’ communications. The vulnerability resides in the design and implementation of RFC […]

Linux Kernel 4.8 Is Adding Microsoft Surface 3 Support

Short Bytes: Opening the gates of a whole new world for Microsoft fans, upcoming Linux kernel 4.8 is adding Surface 3 support. Now, Surface 3 users can enjoy better touchscreen support after installing a Linux distro on their devices. It’s one of the many big changes coming to Linux kernel 4.8, which is slated to […]

Linux Lexicon: Comparing Files in Linux Using Terminal

If you thought learning to work with files was interesting, wait till you read what we have in store for you today. Did you know that it was possible to compare two files in Linux using the Terminal? No? Well, let’s find out! Linux is like a Pandora’s box of amazing stuff! Just when you […]

Debian And TOR Services Now Available Using “Dark” .Onion Address

Short Bytes: The Tor project and the Debian project have teamed to provide Debian services and repositories over the Tor network. Debian has announced the existence of few such services in a blog post. The Debian Project, which works for the development of the Linux-based Debian OS, has announced that its services and repositories will […]