BestCyberNews: News Online

BCN+NAME1

Start knowing

Breaking

Showing posts with label Linux. Show all posts
Showing posts with label Linux. Show all posts

Zero Day Flaw in Linux Kernal, Millions of Linux Servers Affected

9 years ago

Recently Perception Point Research team was identified a zero-day local privilege escalation vulnerability in the Linux kernel,the vulnerability has existed since 2012. This vulnerability has implications for approximately tens of millions of 32-...

Read More

Venom Vulnerability Allows an Attacker to Escape a Virtual Machine on Hypervisors

10 years ago

Venom security vulnerability(CVE-2015-3456) in the virtual floppy drive code used by computer virtualization platforms. This will be allows an attacker to escape a virtual machine on certain open source hyper-visors. This is very serious vulnerab...

Read More

Linux Australia Conference Server Database Hacked

10 years ago

The Linux Australia conference has revealed that one of its servers database was compromised. The personal data of conference attendees might have been exposed. Linux Australia's server held information on delegates to its popular annual conferen...

Read More

New Malware Targeting Linux and Unix Nginx Web Servers

11 years ago

New malware targeting Linux and Unix Nginx web servers, malware authors not only make user of far better network connections and more powerful servers than the average Windows PC, servers are also less likely to be updated on a regular basis and t...

Read More

May 2014 virus activity review from Doctor Web

11 years ago

In May 2014, Doctor Web security researchers discovered a record-high (compared to previous months) number of malicious programs for Linux. Also, during the second half of the month. Doctor Web's analysts continued their in-depth study of the co...

Read More

New Vulnerability on BMC, reveals server Admin Passwords

11 years ago

New vulnerability has been released by the CARI.net team regarding Supermicro’s implementation of IPMI/BMC for management.  The vulnerability involves a plaintext password file available for download simply by connecting to the specific port, 4915...

Read More

Bug On GnuTLS Allows Hackers to Run Malicious Code

11 years ago

One more security vulnerability found on popular cryptographic Library GnuTLS. This bug leaves Linux vulnerable to remote code execution. GnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies arou...

Read More

Windows, Mac OS, and Linux Machines Targeted by Multi-Platform Botnet

11 years ago 0

Kaspersky security researchers had lifted the lid on a multi-platform botnet written in Java targeting machines running Windows, Mac OS, and Linux. Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Upda...

Read More

Linux Worm Targeting the Routers and camera Devices

11 years ago 0

Symantec has discovered a new Linux worm that appears to be engineered to target the “Internet of things”. The worm is capable of attacking a range of small, Internet-enabled devices in addition to traditional computers. Discovered a Linux worm cap...

Read More

Nessus On Linux

13 years ago 0

In last tutorial we saw how to use nessus on Windows. But as told earlier nessus is multi-platform vulnerability scanning/assessment tool. In this section we will cover how we can use nessus on Linux platform. The installation process in Linux is n...

Read More

TeamViewer 7 Finally Available For Linux

13 years ago 0

TeamViewer 7 Finally Available For Linux To Download TeamViewer 7 Click HereGood news for Linux users , TeamViewer 7 for Windows was released about a month ago now the Ver 7 is available for Linux though its a beta release. TeamViewer is an applica...

Read More

Hide Your Personal Files and Folders in Linux

13 years ago 0

The term “Linux” symbolizes security. Because of its never before witnessed high level of security, Linux is “the” operating system platform that is preferred by users globally, for whom making his system secure holds the utmost of priorities. Be i...

Read More

How to uninstall backtrack from hard disk

13 years ago 0

In this article i am gonna show you how to easily you can uninstall your backtrack series (3,4,5) from your hard-disk when you are using it with anotheroperating system like a windows 7 or windows xp.so let we start, we need one bootable windows 7 ...

Read More

Hide Your Personal Files and Folders In Linux

13 years ago 0

The term “Linux” symbolizes security. Because of its never before witnessed high level of security, Linux is “the” operating system platform that is preferred by users globally, for whom making his system secure holds the utmost of priorities. Be i...

Read More

Linux Networking

13 years ago 0

1 Introduction2 The OSI Networking Model2.1 Table 2-1: The Seven OSI Layers3 An Introduction to TCP/IP3.1 TCP Is a Connection-Oriented Protocol3.2 How TCP Establishes A Connection3.3 UDP, TCP's "Connectionless" Cousin3.4 TCP and UDP Ports3.5 The TC...

Read More