If you’re a Linux administrator, then you’re likely aware that even being fully up to date on all of the patches for your Linux distribution of choice is no guarantee that you’re free from ...
Attackers have used a freely available exploit to target a number of 64-bit Linux machines, according to a Linux patch management software firm. The exploit is particularly pernicious, as it can leave ...
The 'sudo' keyword in Unix and Linux allows users to execute certain commands with special-access privileges that cannot otherwise run on a given machine by a user with a lower level of clearance.
A security researcher has released zero-day code for a flaw in the Linux kernel, saying that it bypasses security protections in the operating system. The source code for the exploit was made ...
A French researcher claims to have found a working exploit for the Spectre vulnerability on Linux systems on the VirusTotal database, the first such exploit to come to light since the flaw was made ...
Sometimes, the price of popularity is more scrutiny. As the Linux operating system, and open source in general, gets more and more coverage in mainstream media and news, a lot of security holes, and ...
If you operate Internet-connected servers, chances are you eventually will have to deal with a successful attack. Last year, I discovered that despite the multilayered defenses in place on a test Web ...
A new “exploit” has been revealed for Linux systems running kernel 2.6.30 and 2.6.30.1. I put that in quotes for several reasons. First, those versions of the kernel haven’t been rolled out to the ...