A serious flaw in the certificate verification process of GnuTLS exposes Linux distros, apps to attack. Another flaw exploitable for surveillance purposes. GnuTLS is an open source secure communications library implementing the SSL, TLS and DTLS protocols, it is used in hundreds of software packages including Red Hat desktop,  all Debian and Ubuntu Linux distributions and many […]
Symantec security experts have discovered a new Linux worm that was designed to target the “Internet of things” infecting Intel x86-powered Linux devices. Symantec security experts have detected across a worm that exploits various vulnerabilities in PHP to infect Intel x86-powered Linux devices. Home internet kits with x86 chips are exposed to the risk of […]
Linux Torvalds during last LinixCon admitted to have received pressure from US Intelligence to insert a backdoor into Linux. Linux Torvalds during a question-and-answer ‪session ‬at ‪the LinuxCon publicly admitted that the US Government requested him to insert a backdoor into Linux kernel. The circumstance must induce a reflection in all those experts that believe open […]
Yesterday I wrote about a new variant of malware able to use Google Docs function to hide communications to C&C servers, but daily we read about malicious agents that compromise  every OS, also the ones considered most secure from security community. Recently security experts have detected a rootkit designed to infect Linux machines implementing an infection schema […]
The malware factory still evolving, every day security firms detect new cyber threats that show new sophisticated techniques to avoid protection systems, this is a war that law enforcement fight against cyber criminals. Internet has a new web exploit produced by crime industry, its particularity is that in the deployment phase it is able to […]