Menu

GNU/Linux

Fail2Ban 0.10 finally released
DSA-3949 augeas
Blowing the Whistle on Bad Attribution
DSA-3948 ioquake3
DSA-3945 linux
Skilled bad actors use new pulse wave DDoS attacks to hit multiple targets
A Deep Flaw in Your Car Lets Hackers Shut Down Safety Features
DSA-3946 libmspack
DSA-3947 newsbeuter
DSA-3944 mariadb-10.0
Take Part in a Study to Help Improve Onion Services
Google awards student $10k for discovery of App Engine data leak flaw
Top 10 Enterprise Encryption Products
DSA-3943 gajim
DSA-3941 iortcw
DSA-3942 supervisor
DSA-3940 cvs
DSA-3939 botan1.10
DSA-3936 postgresql-9.6
DSA-3935 postgresql-9.4
Git, SVN and Mercurial Open-Source Version Control Systems Update for Critical Security Vulnerabilit
The DDoS Threat: Ukraine’s Postal Service Hit by Two-Day Attack
Hackers are now using the exploit behind WannaCry to snoop on hotel Wi-Fi
DSA-3937 zabbix
DSA-3938 libgd2
DSA-3933 pjproject
DSA-3934 git
DSA-3932 subversion
DSA-3930 freeradius
World’s first hack using DNA? Malware in genetic code could wreck police CSI work
More on the Vulnerabilities Equities Process
DSA-3928 firefox-esr
DSA-3929 libsoup2.4
openSUSE: 2017:2119-1: important: mariadb
Fedora 26: pspp Security Update
Fedora 26: community-mysql Security Update
The Man Who Wrote Those Password Rules Has a New Tip: N3v$r M1^d!
Send mixed messages: Mozilla wants you to try its encrypted file sharing
SuSE: 2017:2113-1: important: puppet
openSUSE: 2017:2111-1: important: libzypp, zypper
openSUSE: 2017:2112-1: important: the Linux Kernel
openSUSE: 2017:2110-1: important: the Linux Kernel
SuSE: 2017:2109-1: important: tcmu-runner
SuSE: 2017:2103-1: important: Linux Kernel Live Patch 20 for SLE 12
SuSE: 2017:2099-1: important: Linux Kernel Live Patch 16 for SLE 12
SuSE: 2017:2102-1: important: Linux Kernel Live Patch 22 for SLE 12
SuSE: 2017:2098-1: important: Linux Kernel Live Patch 23 for SLE 12
Protect the White Hat Hackers Who Are Just Doing Their Jobs
To truly stay anonymous online, make sure your writing is as dull as the dullest conference call you
Steganography in contemporary cyberattacks