Linux Foundation creates research division to study open source impact
Venture Beast
APRIL 14, 2021
The Linux Foundation is creating a new research unit to provide greater insight into open source technology and the people creating it. Read More.
This site uses cookies to improve your experience. By viewing our content, you are accepting the use of cookies. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country we will assume you are from the United States. View our privacy policy and terms of use.
Venture Beast
APRIL 14, 2021
The Linux Foundation is creating a new research unit to provide greater insight into open source technology and the people creating it. Read More.
Venture Beast
JANUARY 25, 2022
Researchers at security firm Qualys said a new Linux vulnerability, dubbed PwnKit, can be easily exploited for privilege escalation. Read More.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Venture Beast
FEBRUARY 17, 2022
A new vulnerability in Linux software can be exploited for local privilege escalation and to gain root privileges, Qualys researchers said. Read More.
The Verge
JANUARY 21, 2021
A new Linux port allows Apple’s M1 Macs to run Ubuntu for the first time. While a number of M1 components are shared with Apple’s mobile chips, the non-standard chips made it challenging to create Linux drivers to get Ubuntu running properly. Linux is now completely usable on the Mac mini M1. Photo by Vjeran Pavic / The Verge.
The Verge
APRIL 30, 2021
Fifteen days later, the University of Minnesota was banned from contributing to the Linux kernel. “I I suggest you find a different community to do experiments on,” wrote Linux Foundation fellow Greg Kroah-Hartman in a livid email. None of the University of Minnesota researchers would talk to me for this story.
CIO Musings
APRIL 6, 2016
Unix has become Linux, and it is running on an amazing variety of devices. New lineages of Linux have emerged.Some are highly specialized, some are more generic. I run Linux on a half dozen platforms at home. A quick google search revealed not one, but several Linux distros that will run on this unit. Circa 2009.
SecureWorld News
APRIL 21, 2023
ESET researchers have discovered a new Lazarus Group campaign targeting Linux users. According to a recent blog post : "Operation DreamJob is the name for a series of campaigns where the group uses social engineering techniques to compromise its targets, with fake job offers as the lure.
Scott Lowe
MARCH 15, 2024
Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. Security In early February a vulnerability was uncovered in a key component of the Linux boot process. Think Linux doesn’t have malware? TL;DR: It’s not as easy as it might seem.)
CIO Business Intelligence
OCTOBER 6, 2023
When you’re tasked with migrating 200,000 servers to a new operating system, a helping hand is very welcome indeed. With CentOS now part of the Red Hat Enterprise Linux beta stream chain, RHEL was a logical choice for Salesforce, which conducted a rigorous selection process, deciding on RHEL last December.
Scott Lowe
MARCH 21, 2017
This post is part of a series of posts sharing other users’ stories about their migration to Linux as their primary desktop OS. As I mentioned in part 1 of the series , there seemed to be quite a bit of pent-up interest in using Linux as your primary desktop OS. Q: Why did you switch to Linux? is awesome).
Scott Lowe
JUNE 1, 2020
I recently wrapped up an instance where I needed to use the Unison file synchronization application across Linux, macOS, and Windows. While Unison is available for all three platforms and does work across (and among) systems running all three operating systems, I did encounter a few interoperability issues while making it work.
Gizmodo
FEBRUARY 10, 2021
Alex Birsan, a Romanian threat researcher, recently made over $130,000 by virtuously breaking into IT systems at dozens of major tech companies. Read more.
GeekWire
DECEMBER 30, 2023
Among other roles, he served on the National AI Research Resource Task Force , which advised the White House on policy issues, and he’s working on a project to combat AI-related misinformation in the upcoming elections. A great analogy here is what we’ve seen in operating systems.
Dataconomy
DECEMBER 25, 2023
Researchers demonstrated the ability to bombard Apple devices with bogus connection requests, triggering an endless torrent of pop-ups and wreaking havoc on notifications. Pen-testing tool Flipper Zero was eventually used for Bluetooth spam attacks on the iOS operating system ( Image credit ) What is Wall of Flippers?
CIO Business Intelligence
MARCH 24, 2022
After all, entry-level pricing for mainframes in the z15 family running IBM Z operating systems is $250,000. IBM LinuxONE III systems run only Linux at prices starting at $135,000. We have seen the largest growth where clients augment [core] systems with open source — Red Hat Enterprise Linux and OpenShift,” Baker says.
SecureWorld News
DECEMBER 6, 2022
Security researchers from Kaspersky have discovered a previously unidentified data wiper, which they have named CryWiper, that was used to attack Russian government agencies, including mayors' offices and courts. It will also ignore Windows, System, and Boot directories so that the victim's computer still works to an extent.
SecureWorld News
JUNE 13, 2023
"We are continuing to observe an unyielding surge in the volume of cyberthreats, including advanced malware, botnets, ransomware, cryptojacking, and more," said Callie Guenther, Senior Manager of Cyber Threat Research at Critical Start, in a press release.
Gizmodo
OCTOBER 12, 2021
If you use an Android phone and are (rightfully!) worried about digital privacy, you’ve probably taken care of the basics already. You’ve deleted the snoopiest of the snoopy apps, opted out of tracking whenever possible, and taken all of the other precautions the popular how-to privacy guides have told you to. The bad… Read more.
Network World
JUNE 22, 2016
For example, three severe flaws in libarchive, recently found by researchers from Cisco Systems' Talos group, could affect a large number of software products. Libarchive is an open-source library first created for FreeBSD, but since ported to all major operating systems.
SecureWorld News
DECEMBER 8, 2021
Very frequently, an outdated operating system, i.e. Linux kernel, is in use. For more information on the matter, read the IoT Inspector research. IoT Inspector discusses the most common vulnerabilities found: "Some of the security issues were detected more than once.
ForAllSecure
APRIL 19, 2023
It’s time to evolve beyond the UNIX operating system. So while I was editing this podcast on self-healing operating systems, I was reminded of an article that I never finished for Fobes.com. It’s a radical rethinking of how we even view our current choices of UNIX-derived operating systems.
ForAllSecure
JUNE 16, 2020
Test and evaluation teams that have a basic understanding of Linux can also use fuzzers. For example, the Defense Advanced Research Projects Agency ran a Cyber Grand Challenge to see if fully autonomous cybersecurity (both offense and defense) was possible, without any developer involvement or source code. How to get started?
ForAllSecure
JUNE 16, 2020
Test and evaluation teams that have a basic understanding of Linux can also use fuzzers. For example, the Defense Advanced Research Projects Agency ran a Cyber Grand Challenge to see if fully autonomous cybersecurity (both offense and defense) was possible, without any developer involvement or source code. How to get started?
ForAllSecure
JUNE 16, 2020
Test and evaluation teams that have a basic understanding of Linux can also use fuzzers. For example, the Defense Advanced Research Projects Agency ran a Cyber Grand Challenge to see if fully autonomous cybersecurity (both offense and defense) was possible, without any developer involvement or source code. How to get started?
Dataconomy
APRIL 13, 2023
A Virtual Network Computing port is a network port that is used by VNC servers and clients to establish a connection over a network The VNC technology was developed by the British company Olivetti Research Laboratory in the late 1990s and is currently maintained and extended by RealVNC Ltd. and the open-source community.
Scott Lowe
FEBRUARY 16, 2017
The rise of the disaggregated network operating system (NOS) marches on: this time, it’s Big Switch Networks announcing expanded hardware support in Open Network Linux (ONL) , upon which its own NOS is based. I use OTR with Adium on OS X, and OTR with Pidgin on my Fedora Linux laptop.). Operating Systems/Applications.
Scott Lowe
MAY 27, 2022
Researchers have uncovered a potential security flaw in Apple Silicon CPUs; more details in this 9to5Mac article. I’m not sure how I feel about security researchers calling this flaw “not that bad.” Operating Systems/Applications. Servers/Hardware. Programming.
Kitaboo
JUNE 14, 2021
The multimedia-rich digital content can be read across Android, iOS, and Windows operating systems. It works pretty well on Mac, Linux, and Windows. Whenever you need help, Scrivener lets you open your draft and your research content in the same window. Besides, KITABOO offers secure B2C, B2B, and B2B2C distribution.
Scott Lowe
JANUARY 28, 2016
The rise of Linux in importance in the networking industry continues, with Arista announcing enhancements to Arista EOS to support—among other things—Docker containers. As a partial counterpoint to the increased use/visibility of Linux in the networking industry, check out Ivan’s take on Dell’s OS10 announcement. Networking.
Scott Lowe
MARCH 8, 2016
Cue the round of folks claiming that this is why proprietary network operating systems [NOSes] are the route the networking industry should be taking.). Operating Systems/Applications. ZFS will be in the next Ubuntu Linux LTS release. Check out Anthony Burke’s introductory post on PowerNSX for more details.
Scott Lowe
JANUARY 28, 2016
The rise of Linux in importance in the networking industry continues, with Arista announcing enhancements to Arista EOS to support—among other things—Docker containers. As a partial counterpoint to the increased use/visibility of Linux in the networking industry, check out Ivan’s take on Dell’s OS10 announcement. Networking.
Galido
MARCH 19, 2019
These areas of IT include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Information Week shares news, analysis and research for business technology professionals, plus peer-to-peer knowledge sharing.
Scott Lowe
JUNE 29, 2016
I plan to do a more in-depth write-up on HexaTier soon, after I’ve had a bit of time to do more research. Andrew Beekhof tackles some issues around the evolving OpenStack HA architecture ; in particular, how and when Pacemaker should be used as more and more OpenStack services become able to operate in active/active configurations.
Scott Lowe
MAY 22, 2015
Welcome to Technology Short Take #51, another collection of posts and links about key data center technologies like networking, virtualization, cloud management, and applications/operating systems. Here’s one way , using Ravello Systems. Flavio Leitner has a nice article comparing OVS internal ports with Linux veth devices.
Scott Lowe
MAY 11, 2019
Since I’ve had a number of folks ask me about migrating to Linux, I thought I’d supplement my Linux migration series with a “prequel” about some of the work that happened to prepare for the migration. Understanding my Tasks and Workflows.
Galido
MAY 1, 2019
These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Information Week shares news, analysis and research for business technology professionals, plus peer-to-peer knowledge sharing.
Galido
MARCH 22, 2019
These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Information Week shares news, analysis and research for business technology professionals, plus peer-to-peer knowledge sharing.
Dataconomy
OCTOBER 31, 2023
Businesses can also use VPNs to protect their proprietary research and data, which helps them gain a competitive edge. It is compatible with multiple operating systems, including Linux, Windows, macOS, iOS and Android. VPNs can also be used to protect voice-over IP (VoIP) calls, which enhances communication security.
ForAllSecure
DECEMBER 2, 2021
You’ll want someone with years of pen testing experience, some one who knows the operating system like no other. So in general, an operating system that eventually allows you to gain more information about the context within which attack was made. Maybe your first concern is to make sure the company is functional.
ForAllSecure
APRIL 22, 2021
In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. So, in the book, we have a whole chapter dedicated to safely and lawfully conducting security research. Most of us don't have access to industrial systems on this item.
ForAllSecure
APRIL 22, 2021
In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. So, in the book, we have a whole chapter dedicated to safely and lawfully conducting security research. Most of us don't have access to industrial systems on this item.
Galido
SEPTEMBER 25, 2019
These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Information Week shares news, analysis and research for business technology professionals, plus peer-to-peer knowledge sharing.
Galido
MARCH 19, 2019
These areas of IT include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Information Week shares news, analysis and research for business technology professionals, plus peer-to-peer knowledge sharing.
Dataconomy
OCTOBER 17, 2023
White hat hackers, also known as ethical hackers or security researchers, are individuals who use their computer programming and networking skills to help organizations protect themselves from cyber threats. Familiarize yourself with operating systems Get comfortable with different operating systems, including Windows, macOS, and Linux.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content