Security Leftovers
-
Pixel 6 and Galaxy S22 affected by major new Linux kernel vulnerability [Ed: Well, privilege escalation is not so severe, compared to what happens in operating systems with NSA back doors.]
A seemingly major vulnerability has been discovered by security researcher and Northwestern PhD student Zhenpeng Lin, affecting the kernel on the Pixel 6 and 6 Pro and other Android devices running Linux kernel versions based on 5.10 like the Galaxy S22 series. Precise details for how the vulnerability works have not yet been published, but the researcher claims that it can enable arbitrary read and write, privilege escalation, and disable SELinux security protections — in short, this is a biggie. The researcher has verified to Android Police that Google was not informed of the vulnerability before its demonstration on Twitter.
-
DoD announces launch of a new bug bounty program [Ed: They can reward themselves. They put bug doors in a lot of things.]
Today, the Department of Defense (DoD) announced that the Chief Digital and Artificial Intelligence Office (CDAO), the Directorate for Digital Services and the Department of Defense Cyber Crime Center (DC3) are launching the “Hack U.S.” bug bounty program.
The program will offer financial rewards for ethical hackers and security researchers who can identify critical and high severity vulnerabilities in the scope of the DoD’s vulnerability disclosure program.
-
NIST Announces First Four Quantum-Resistant Cryptographic Algorithms
NIST has not chosen a public-key encryption standard. The remaining candidates are BIKE, Classic McEliece, HQC, and SIKE.
I have a lot to say on this process, and have written an essay for IEEE Security & Privacy about it. It will be published in a month or so.
-
Brick by brick: why Docusaurus is a powerful documentation framework [Ed: Openwashing of proprietary software wishing to collect your passwords]
Late last year, I started exploring the React-based documentation framework Docusaurus, and spent a good chunk of time going through the documentation. (Surprise! They use their own product!) I got pretty familiar with how it works under the hood, and the ways in which it can be expanded on. It's also got a bustling community, which is unsurprising since it’s entirely open source.
- Login or register to post comments
- Printer-friendly version
- 1125 reads
- PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
today's howtos
|
Open Hardware: XON/XOFF and Raspberry Pi Pico
|
Security Leftovers
|
How to Apply Accent Colour in Ubuntu DesktopA step-by-step tutorial on how to apply accent colour in Ubuntu desktop (GNOME) with tips for Kubuntu and others. |
Recent comments
2 days 1 hour ago
2 days 5 hours ago
2 days 5 hours ago
3 days 12 hours ago
3 days 13 hours ago
3 days 14 hours ago
3 days 14 hours ago
3 days 15 hours ago
3 days 17 hours ago
3 days 19 hours ago