Linux

Linux news, analysis, research, how-to, opinion, and video.

linux tux mascot logo
malware attack cyberespionage code hacker

Linux Tux

Suspect arrested in 5-year-old kernel.org breach

Five years after a security breach forced the Linux Foundation to take kernel.org offline and to rebuild several of its servers, police have arrested a suspect in the case.

linux course

$39 for 54 Hours of Training with the Linux Essentials Bundle - Deal Alert

These 5 courses will take you from newbie to Linux pro. Complete with two classes designed for Linux beginners, the Linux Essentials Bundle is the first step to a system administrator career, or to making a lateral move to your IT...

crossover 15

66% off CrossOver, and Run Windows Apps On Your Mac - Deal Alert

It’s no secret that Windows, Mac, and Linux are the three major operating systems dominating the market today—and that their incompatibility often creates issues for users. For the inevitable moments when you need to use a Windows app...

Great white shark

Use the internet? This Linux flaw could open you up to attack

A flaw in the Transmission Control Protocol (TCP) used by Linux since late 2012 poses a serious threat to internet users, whether or not they use Linux directly.

Ubuntu China

Flaw in vBulletin add-on leads to Ubuntu Forums database breach

Ubuntu support forums users should be on the lookout for dodgy emails after the website's database of 2 million email addresses has been stolen.

linux course

Save Hundreds On The Complete Linux System Administrator Bundle - Deal Alert

Packed with over 100 hours of instruction, this bundle will help you dive into Linux, the popular open-source operating system, and is currently on sale over 90% off its typical price.

video

How to Set Up Bash in Windows 10

On Wednesday, Microsoft released a version of its operating system that lets users try out Linux on Windows 10. Here's how to get it set up.

Linux penguin

VMware fixes XSS flaws in vRealize for Linux

The stored XSS vulnerabilities in vReader affected only some versions, but could result in code execution

20151027 red hat logo

That Linux flaw may be fixed, but what about your containers?

Countless patching efforts are now under way for the years-old bug discovered in the GNU C Library this week, but organizations that use container technology shouldn't relax just yet.

pothole crew patch

Use Linux? Stop what you're doing and apply this patch

A buffer-overflow vulnerability uncovered Tuesday in the GNU C Library poses a serious threat to countless Linux users.

linux penguin shoot

Linux zero-day affects most Androids, millions of Linux PCs

A new zero-day vulnerability has been discovered that allows Android or Linux applications to escalate privileges and gain root access, according to a report released this morning by Perception Point.

linux ransom

Third try is no charm for failed Linux ransomware creators

Researchers found a flaw that allows them to decrypt files affected by a new version of Linux.Encoder, a file-encrypting ransomware program that infects Linux Web servers.

IoT data challenges

Review: 7 data recovery tools for every data disaster

From resurrecting lost photos to recovering RAID arrays, these utilities can bring your data back from the dead

video

The Endless Mini $79 PC: A desktop for the masses

The $79 Endless Mini is a Linux desktop that assumes you don't have an Internet connection -- so it tries to store as much of it as it can on the box itself.

backspace key

Vulnerability in popular bootloader puts locked-down Linux computers at risk

Pressing the backspace key 28 times can bypass the Grub2 bootloader's password protection and allow a hacker to install malware on a locked-down Linux system.

dark corners of network

A viral vigilante may be keeping an eye on your home router

Researchers at Symantec have shed new light on an old virus affecting routers and other devices running Linux: it appears to be protecting them from other malware infections

jellyfish

New Linux rootkit leverages GPUs for stealth

The Jellyfish proof-of-concept rootkit uses the processing power of graphics cards and runs in their dedicated memory

linux penguin shoot

DDoS malware for Linux systems comes with sophisticated custom-built rootkit

XOR.DDoS is distributed through SSH brute-force password guessing attacks

Load More