Showing headlines posted by abennett

( 1 2 3 4 5 6 ... 10 ) Next »

5 things you need to know about Stack Clash to secure your shared Linux environment

Attackers can locally exploit the privilege escalation vulnerability to gain root access over Linux, Solaris and BSD machines. This is bad news for Unix-based servers, and even more so for multi-tenant environments.

18 things you should know about using Linux tools in Windows 10

Windows 10 can now run (many) Linux binaries. Yes, really. Here’s what you need to know to make the most of the Windows Subsystem for Linux.

Dell EMC's newest switches will come with its open network OS

  • CIO.com; By Stephen Lawson (Posted by abennett on May 8, 2017 7:18 PM EDT)
  • Story Type: News Story
Dell's drive into open networking accelerated on Monday with the announcement of the first switches to ship with OS10, the company's network operating system that's based on open source.

Open-source chip mimics Linux's path to take on closed x86, ARM CPUs

  • CIO.com; By Agam Shah (Posted by abennett on May 4, 2017 3:26 PM EDT)
  • Story Type: News Story
The RISC-V open-source architecture, created by researchers at the University of California, Berkeley, in 2010, is open to all who want to use it. The RISC-V design can be modified for PCs, servers, smartphones, wearables, and other devices.

Cloudera’s IPO is overshadowed by a rival it won’t mention

  • CIO.com; By Arik Hesseldahl (Posted by abennett on Apr 28, 2017 5:05 AM EDT)
  • Story Type: News Story; Groups: Cloud
Big data's poster child is selling itself to investors as a machine learning company, but is really still in the Hadoop business just like Hortonworks, the competitor it would like to ignore.

EdgeX brings open source interoperability to IoT

  • CIO.com; By Gary Eastwood (Posted by abennett on Apr 28, 2017 1:22 AM EDT)
  • Story Type: News Story
A new open source framework is a major step in bringing IoT into mainstream interoperability.

How to track and secure open source in your enterprise

  • CIO.com; By Mary Branscombe (Posted by abennett on Apr 24, 2017 4:50 PM EDT)
  • Story Type: Security
Your developers are using open source — even if you don't know about it. Here's how to take control and why you need to.

Docker wants to help put old enterprise apps into containers

Docker is offering enterprises an easier on-ramp to using containers with a new consulting program aimed at taking a legacy application and migrating it to a container in five days.

Unpatched vulnerability exposes Magento online shops to hacking

An unpatched vulnerability in the Magento e-commerce platform could allow hackers to upload and execute malicious code on web servers that host online shops.

Samsung's squashing of malicious Tizen smart TV bugs is turning messy

After 40 critical vulnerabilities on Samsung's Tizen -- used in smart TVs and smartwatches -- were exposed this week by Israeli researcher Amihai Neiderman, the company is scrambling to patch them. But Samsung still doesn't know many of the bugs that need to be patched.

Apache Struts 2 exploit used to install ransomware on servers

Attackers are exploiting a vulnerability patched last month in the Apache Struts web development framework to install ransomware on servers. The flaw is located in the Jakarta Multipart parser in Apache Struts 2 and allows attackers to execute system commands with the privileges of the user running the web server process.

Critical Xen hypervisor flaw endangers virtualized environments

A critical vulnerability in the widely used Xen hypervisor allows attackers to break out of a guest operating system running inside a virtual machine and access the host system's entire memory.

Open-source developers targeted in sophisticated malware attack

For the past few months, developers who publish their code on GitHub have been targeted in an attack campaign that uses a little-known but potent cyberespionage malware.

Google cites progress in Android security, but patching issues linger

By the end of 2016, about half of Android devices -- 735 million -- had received a security patch issued during the year, according to the report. That means another half hasn’t, leaving the vulnerabilities in those phones unfixed.

How to make money from open source software

What steps you need to take – and what mistakes you need to avoid – if you want to launch an open source software startup.

Hackers exploit Apache Struts vulnerability to compromise corporate web servers

Attackers are widely exploiting a recently patched vulnerability in Apache Struts, open-source web development framework for Java web applications, that allows them to remotely execute malicious code on web servers.

Android gets patches for critical OpenSSL, media server and kernel driver flaws

A five-month-old flaw in Android's SSL cryptographic libraries is among the 35 critical vulnerabilities Google fixed in its March security patches for the mobile OS.

WikiLeaks' CIA document dump shows agency can compromise Android, TVs

WikiLeaks has released more than 8,700 documents it says come from the CIA's Center for Cyber Intelligence, with some of the leaks saying the agency had 24 "weaponized" and previously undisclosed exploits for the Android operating system as of 2016.

HackerOne offers bug bounty service for free to open-source projects

HackerOne, the company behind one of the most popular vulnerability coordination and bug bounty platforms, has decided to make its professional service available to open-source projects for free.

SHA-1 collision can break SVN code repositories

The WebKit repository was corrupted after someone committed two colliding PDF files to it.

( 1 2 3 4 5 6 ... 10 ) Next »