- Welcome Guest
- Sign In
A flaw in the RFC 5961 specification the Internet Engineering Task Force developed to protect TCP against blind in-window attacks could threaten Android smartphones, as well as every Linux computer on the planet. The flaw is described in a paper a team of researchers presented at the 25th Usenix Sec...
Linux-operated botnet Distributed Denial of Service attacks surged in this year's second quarter, due to growing interest in targeting Chinese servers, according to a Kaspersky Lab report released this week. South Korea kept its top ranking for having the most command-and-control servers. Brazil, It...
I joined a bunch of analysts in discussing Hewlett Packard Enterprise's next move at a secret conclave last week. The company had just announced the sale of its IT services, which basically undid much of Mark Hurd's work as CEO. It already had sold off PCs and printers, more than undoing Carly Fiori...
Canonical on Thursday launched Ubuntu 16.04, aka "Xenial Xerus," an upgrade that will be supported for the next five years. The latest version for all desktop, server and cloud editions will be available for download starting Thursday. Ubuntu 16.04 includes four major technology advancements geared...
Following Apple's announcement last week, I noticed a number of reports on how disappointed customers were that there was nothing they wanted to wait in line for hours to buy. I personally thought they should have been excited about that, because I hate to stand in lines. I've never really figured o...
Microsoft on Tuesday announced plans to release a version of its enterprise database product SQL Server 2016 for Linux. "Bringing SQL Server to Linux is another way we are making our products and new innovations more accessible to a broader set of users and meeting them where they are," said Microso...
A report released Tuesday on the DROWN vulnerability raises concerns about possible attacks that could expose encrypted communications. DROWN is a serious vulnerability that affects HTTPS and other services using SSL version 2, according to the team of security researchers who compiled the report. T...
Suse Linux this week announced a partnership to extend support for 64-bit ARM server processors. The goal is to give Suse Linux Enterprise 12 users greater flexibility and cost efficiencies with respect to their infrastructures. This expansion makes available to seven partners a version of Suse Linu...
Linbit on Tuesday announced the release of DRBD9, its new distributed replicated block device product. DRBD9 provides enterprise Linux users with synchronous server storage replication including support for native remote direct memory access, or RDMA, and OpenStack integration. Linbit developed the ...
It was a little over a year ago that the Heartbleed bug shocked the Internet with its potential for mischief. Now another flaw in open source code has sent network administrators into damage control mode. The bug, called "Venom" for "Virtualized Environment Neglected Operations Manipulation," allows...
Crowdstrike on Wednesday made public its discovery of yet another long-buried Linux vulnerability. "Venom," as it has been dubbed, was unearthed by the firm's senior security researcher, Jason Geffner. It is listed as vulnerability CVE-2015-3456. Venom exists in the virtual floppy drive code used by...
Patches for GHOST, a critical vulnerability in glibc, the Linux GNU C Library, now are available through vendor communities for a variety of Linux server and desktop distributions. Qualys earlier this week reported its discovery of GHOST, a vulnerability that allows attackers to remotely take contro...
IBM launched its newest mainframe, the z13, last week in New York City. Built for the mobile economy, the z13 can process 2.5 billion transactions daily. It enables real-time encryption on all mobile transactions at scale, and it includes embedded analytics that provide real-time transactions faster...
Banks and businesses toiled over the weekend to crush a bug in a widely used open source operating system. The flaw has been in Unix for some 25 years, but it was revealed just last week. If exploited, the vulnerability in BASH could be used to inject malicious code or take command of a system or de...