article thumbnail

North Korean APT Uses Fake Job Offers as Linux Malware Lure

SecureWorld News

ESET researchers have discovered a new Lazarus Group campaign targeting Linux users. According to a recent blog post : "Operation DreamJob is the name for a series of campaigns where the group uses social engineering techniques to compromise its targets, with fake job offers as the lure.

Malware 67
article thumbnail

ProBeat: Net Applications will no longer track the browser wars

Venture Beast

After 14 years, Net Applications is killing off its NetMarketShare reports that track browser and operating system market share. Read More.

.Net 95
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How a university got itself banned from the Linux kernel

The Verge

Fifteen days later, the University of Minnesota was banned from contributing to the Linux kernel. “I I suggest you find a different community to do experiments on,” wrote Linux Foundation fellow Greg Kroah-Hartman in a livid email. But among the other major characters — the Linux developers — there was no such hesitancy.

Linux 126
article thumbnail

The Browser as an application platform : spf13.com

SPF13

t the operating system, nor is it adobe air,net or java, itâ??s s promised mission, the underlying operating system wouldnâ??t Wanna write a application that works on everything from Mac, windows, Linux, beos, iOS, android, webos, etc; write it for the browser. s the browser. bostinnovation.com).

article thumbnail

The Hacker Mind Podcast: EP 69 Self-Healing Operating Systems

ForAllSecure

It’s time to evolve beyond the UNIX operating system. So while I was editing this podcast on self-healing operating systems, I was reminded of an article that I never finished for Fobes.com. It’s a radical rethinking of how we even view our current choices of UNIX-derived operating systems.

article thumbnail

Technology Short Take 131

Scott Lowe

Quentin Machu outlines a series of problems his company experienced using Weave Net as the CNI for their Kubernetes clusters, as well as describes the migration process to a new CNI. Here’s a review of targeted attacks and APTs (advanced persistent threats) on Linux. Operating Systems/Applications.

Linux 60
article thumbnail

Technology Short Take #63

Scott Lowe

In any case, here’s another collection of links and articles from around the Net on the major data center technology areas. At DevOps Networking Forum 2016, I had the opportunity to share a presentation on some Linux networking options. Operating Systems/Applications. I’ll try to correct that for the next one. Networking.

Vmware 60