Linux

Cyber Attack news for the last day of this year 2018

1.) France based security engineers have found a software tool to navigate and monitor the dark web. But they also argue that the tool could spell deep trouble to the web users if it falls into wrong hands. Nicolas Hernandez, the Co-founder, and CEO of Aleph Networks, a company based in Lyon- France said that […]

Apple Mac computers block Linux OS for Cyber Security reasons

Apple Inc. which made a recent announcement about the security features in its newly devised Apple T2 Security Chips is reported to be blocking the Linux operating system from booting up of its devices. As per the details available to Cybersecurity Insiders, Apple Macs are only allowing Microsoft Windows OS and their own MacOS to […]

Auditing Linux environments using LIDS and ‘auditd’

This post was originally published here by satish dange. If you use LIDS at all, your life is about to get easier: Recently we released nine new templates for the CloudPassage Halo log-based intrusion detection system, (LIDS) which consists of different rules/policies for ‘auditd’. The CloudPassage Halo log-based intrusion detection system (LIDS) is a Halo […]

Microsoft uses Linux instead of Windows for its Azure Sphere

Microsoft Corporation has announced that it will be using Linux OS instead of Windows 10 to bring IoT security and Connectivity to Multiple Cloud environments. Announcing the same at the RSA Conference last week, the company disclosed that the move will help the firm adhere to new crossover a class of Micro Controller Units that […]

How Does Whonix Make Kali Linux Anonymous & How to Prevent It?

This post was originally published here by  Irfan Shakeel. The Internet was not designed with anonymity in mind, but things have changed. Anonymity has become a necessary and legitimate objective in many applications (browsing the internet, chatting, sending instant messages etc.). The main reason for this is that even if traffic is encrypted, only the […]

Share this page