Linux Foundation creates research division to study open source impact
Venture Beast
APRIL 14, 2021
The Linux Foundation is creating a new research unit to provide greater insight into open source technology and the people creating it. Read More.
This site uses cookies to improve your experience. By viewing our content, you are accepting the use of cookies. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country we will assume you are from the United States. View our privacy policy and terms of use.
Venture Beast
APRIL 14, 2021
The Linux Foundation is creating a new research unit to provide greater insight into open source technology and the people creating it. Read More.
The Verge
APRIL 30, 2021
Fifteen days later, the University of Minnesota was banned from contributing to the Linux kernel. “I I suggest you find a different community to do experiments on,” wrote Linux Foundation fellow Greg Kroah-Hartman in a livid email. None of the University of Minnesota researchers would talk to me for this story.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Scott Lowe
MARCH 15, 2024
Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. Security In early February a vulnerability was uncovered in a key component of the Linux boot process. Think Linux doesn’t have malware? TL;DR: It’s not as easy as it might seem.)
CIO Business Intelligence
OCTOBER 6, 2023
When you’re tasked with migrating 200,000 servers to a new operating system, a helping hand is very welcome indeed. With CentOS now part of the Red Hat Enterprise Linux beta stream chain, RHEL was a logical choice for Salesforce, which conducted a rigorous selection process, deciding on RHEL last December.
GeekWire
DECEMBER 30, 2023
Among other roles, he served on the National AI Research Resource Task Force , which advised the White House on policy issues, and he’s working on a project to combat AI-related misinformation in the upcoming elections. ” The need for strong open-source models: “The consolidation of power in AI is a huge risk.
Scott Lowe
MARCH 21, 2017
This post is part of a series of posts sharing other users’ stories about their migration to Linux as their primary desktop OS. As I mentioned in part 1 of the series , there seemed to be quite a bit of pent-up interest in using Linux as your primary desktop OS. Q: Why did you switch to Linux? is awesome).
CIO Business Intelligence
MARCH 24, 2022
After all, entry-level pricing for mainframes in the z15 family running IBM Z operating systems is $250,000. IBM LinuxONE III systems run only Linux at prices starting at $135,000. The program enables customers to pay only for what they use of Z system hardware and software. Z upgrades and open source.
Dataconomy
DECEMBER 25, 2023
Researchers demonstrated the ability to bombard Apple devices with bogus connection requests, triggering an endless torrent of pop-ups and wreaking havoc on notifications. Pen-testing tool Flipper Zero was eventually used for Bluetooth spam attacks on the iOS operating system ( Image credit ) What is Wall of Flippers?
Network World
JUNE 22, 2016
In a world where any new software project is built in large part on existing third-party code, finding and patching vulnerabilities in popular open-source libraries is vital to creating reliable and secure applications. Libarchive is an open-source library first created for FreeBSD, but since ported to all major operating systems.
SecureWorld News
JUNE 13, 2023
"We are continuing to observe an unyielding surge in the volume of cyberthreats, including advanced malware, botnets, ransomware, cryptojacking, and more," said Callie Guenther, Senior Manager of Cyber Threat Research at Critical Start, in a press release.
ForAllSecure
JUNE 16, 2020
The Google Chrome web browser, for example, is used on billions of devices and is completely open source, allowing any attacker to review exactly how the software works. Test and evaluation teams that have a basic understanding of Linux can also use fuzzers. Those just starting out should try open source tools.
ForAllSecure
JUNE 16, 2020
The Google Chrome web browser, for example, is used on billions of devices and is completely open source, allowing any attacker to review exactly how the software works. Test and evaluation teams that have a basic understanding of Linux can also use fuzzers. Those just starting out should try open source tools.
ForAllSecure
JUNE 16, 2020
The Google Chrome web browser, for example, is used on billions of devices and is completely open source, allowing any attacker to review exactly how the software works. Test and evaluation teams that have a basic understanding of Linux can also use fuzzers. Those just starting out should try open source tools.
ForAllSecure
APRIL 19, 2023
It’s time to evolve beyond the UNIX operating system. So while I was editing this podcast on self-healing operating systems, I was reminded of an article that I never finished for Fobes.com. It’s a radical rethinking of how we even view our current choices of UNIX-derived operating systems.
Scott Lowe
JANUARY 28, 2016
The rise of Linux in importance in the networking industry continues, with Arista announcing enhancements to Arista EOS to support—among other things—Docker containers. As a partial counterpoint to the increased use/visibility of Linux in the networking industry, check out Ivan’s take on Dell’s OS10 announcement. Networking.
Scott Lowe
MAY 27, 2022
Researchers have uncovered a potential security flaw in Apple Silicon CPUs; more details in this 9to5Mac article. I’m not sure how I feel about security researchers calling this flaw “not that bad.” Operating Systems/Applications. Servers/Hardware. Cloud Computing/Cloud Management. Kubernetes 1.24
Scott Lowe
JANUARY 28, 2016
The rise of Linux in importance in the networking industry continues, with Arista announcing enhancements to Arista EOS to support—among other things—Docker containers. As a partial counterpoint to the increased use/visibility of Linux in the networking industry, check out Ivan’s take on Dell’s OS10 announcement. Networking.
Dataconomy
APRIL 13, 2023
A Virtual Network Computing port is a network port that is used by VNC servers and clients to establish a connection over a network The VNC technology was developed by the British company Olivetti Research Laboratory in the late 1990s and is currently maintained and extended by RealVNC Ltd. and the open-source community.
Galido
MARCH 19, 2019
These areas of IT include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Information Week shares news, analysis and research for business technology professionals, plus peer-to-peer knowledge sharing.
ForAllSecure
OCTOBER 13, 2020
In this episode, one researcher explains how he successfully escaped the Chrome sandbox, and how bug bounties must just be a good thing resulting in better security for us all. And in between contracts, we like to do vulnerability research on open source software or major high-impact software targets.
ForAllSecure
OCTOBER 13, 2020
In this episode, one researcher explains how he successfully escaped the Chrome sandbox, and how bug bounties must just be a good thing resulting in better security for us all. And in between contracts, we like to do vulnerability research on open source software or major high-impact software targets.
ForAllSecure
OCTOBER 13, 2020
In this episode, one researcher explains how he successfully escaped the Chrome sandbox, and how bug bounties must just be a good thing resulting in better security for us all. And in between contracts, we like to do vulnerability research on open source software or major high-impact software targets.
Galido
MAY 1, 2019
These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Information Week shares news, analysis and research for business technology professionals, plus peer-to-peer knowledge sharing.
Galido
MARCH 22, 2019
These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Information Week shares news, analysis and research for business technology professionals, plus peer-to-peer knowledge sharing.
Galido
SEPTEMBER 25, 2019
These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Information Week shares news, analysis and research for business technology professionals, plus peer-to-peer knowledge sharing.
Galido
MARCH 19, 2019
These areas of IT include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Information Week shares news, analysis and research for business technology professionals, plus peer-to-peer knowledge sharing.
ForAllSecure
DECEMBER 17, 2021
As I produce this episode, there's a dangerous new vulnerability known informally as Log4Shell, it’s a flaw in an open source Java logging library developed by the Apache Foundation and, in the hands of a malicious actor, could allow for remote code injection. Vamosi: The idea behind Open Source is great.
Scott Lowe
MARCH 23, 2017
As opposed to just encrypting data at the transport level (although Acra does that between components of its architecture) or just encrypting data at the storage level (using an encrypted file system or similar), Acra targets encrypting data at the table/row/column level within a database. Acra is open source and available via GitHub.
ForAllSecure
APRIL 22, 2021
In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. So, in the book, we have a whole chapter dedicated to safely and lawfully conducting security research. Most of us don't have access to industrial systems on this item.
ForAllSecure
APRIL 22, 2021
In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. So, in the book, we have a whole chapter dedicated to safely and lawfully conducting security research. Most of us don't have access to industrial systems on this item.
ForAllSecure
DECEMBER 2, 2021
You’ll want someone with years of pen testing experience, some one who knows the operating system like no other. So in general, an operating system that eventually allows you to gain more information about the context within which attack was made. Maybe your first concern is to make sure the company is functional.
ForAllSecure
MARCH 24, 2021
How could open source software be vulnerable for so long? In a moment I’ll tell you about a flaw discovered only through fuzz testing in a very old open source product. Vamosi: So a vulnerable version of Bash provided an attacker the ability to pass untrusted code to other systems and processes.
ForAllSecure
MARCH 24, 2021
How could open source software be vulnerable for so long? In a moment I’ll tell you about a flaw discovered only through fuzz testing in a very old open source product. Vamosi: So a vulnerable version of Bash provided an attacker the ability to pass untrusted code to other systems and processes.
ForAllSecure
AUGUST 12, 2019
Open Source Security Podcast helps listeners better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers, the pair covers a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. The full transcript is also available below.
ForAllSecure
AUGUST 12, 2019
Open Source Security Podcast helps listeners better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers, the pair covers a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. The full transcript is also available below.
ForAllSecure
AUGUST 12, 2019
Open Source Security Podcast helps listeners better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers, the pair covers a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. The full transcript is also available below.
ForAllSecure
AUGUST 22, 2020
The Defense Advanced Research Agency or DARPA periodically hosts these grand challenges that are designed to push technology to the bleeding edge. I think that goal was certainly achieved to get some excitement and investment in research in this area. So the first one was based off of CLI, which is a open source symbolic executer.
ForAllSecure
AUGUST 21, 2020
The Defense Advanced Research Agency or DARPA periodically hosts these grand challenges that are designed to push technology to the bleeding edge. I think that goal was certainly achieved to get some excitement and investment in research in this area. So the first one was based off of CLI, which is a open source symbolic executer.
ForAllSecure
AUGUST 21, 2020
The Defense Advanced Research Agency or DARPA periodically hosts these grand challenges that are designed to push technology to the bleeding edge. I think that goal was certainly achieved to get some excitement and investment in research in this area. So the first one was based off of CLI, which is a open source symbolic executer.
Scott Lowe
OCTOBER 23, 2020
I think a fair number of folks may not be aware that the Nginx ingress controller for Kubernetes—both the community version and the Nginx-maintained open source version—do suffer from timeouts and errors resulting from changes in the back-end application’s list of endpoints (think pods being added or removed).
ForAllSecure
MARCH 30, 2022
Researchers Nir Ohfeld and Sagi Tzadik join The Hacker Mind to talk about their presentation at Black Hat Europe 2021 on the ChaosDB vulnerability. In this episode I’ll talk with two security researchers who simply followed the rabbit. Recently, though, another set of researchers found another vulnerability in Azure.
ForAllSecure
AUGUST 16, 2022
I’m reminded of when I trained to use Kali Linux. In some cases they’re taking open source, community-based tools and leveraging them in creative new ways against common threats. It traditionally supports the research for several U.S. Kali is a swiss army knife of useful tools. There are the vendors, right?
ForAllSecure
MAY 4, 2021
Vamosi: Formed in 1958, MITRE, which is an acronym for MIT Research Establishment, manages federally funded research and development centers (FFRDCs) supporting several U.S. Vamosi: According to MITRE ATT three is a threat group that some researchers have attributed to China's Ministry of State Security. government agencies.
ForAllSecure
MAY 4, 2021
Vamosi: Formed in 1958, MITRE, which is an acronym for MIT Research Establishment, manages federally funded research and development centers (FFRDCs) supporting several U.S. Vamosi: According to MITRE ATT three is a threat group that some researchers have attributed to China's Ministry of State Security. government agencies.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content