DDoS malware for Linux systems comes with sophisticated custom-built rootkit

Friday, February 6th, 2015

A malware program designed for Linux systems, including embedded devices with ARM architecture, uses a sophisticated kernel rootkit that's custom built for each infection. The malware, known as XOR.DDoS, was first spotted in September by security research outfit Malware Must Die. However, it has since evolved and new versions were seen ...

How to Log In To Your Linux Desktop With Google Authenticator

Sunday, February 1st, 2015

For additional security, you can require a time-based authentication token as well as a password to log into your Linux PC. This solution uses Google Authenticator and other TOTP apps. This process was performed on Ubuntu 14.04 with the standard Unity desktop and LightDM login manager, but the principles are the same ...

Critical GHOST vulnerability affects most Linux Systems

Wednesday, January 28th, 2015

A highly critical vulnerability has been unearthed in the GNU C Library (glibc), a widely used component of most Linux distributions, that could allow attackers to execute malicious code on servers and remotely gain control of Linux machines. The vulnerability, dubbed "GHOST" and assigned CVE-2015-0235, was discovered and disclosed by the ...

‘Less’ means more to malware authors targeting Linux users

Monday, November 24th, 2014

Using the "less" Linux command to view the contents of files downloaded from the Internet is a dangerous operation that can lead to remote code execution, according to a security researcher. At first glance, less appears to be a harmless command that outputs a file's content to a terminal window and ...

Bug in Bash shell creates big security hole on anything with *nix in it

Wednesday, September 24th, 2014

A security vulnerability in the GNU Bourne Again Shell (Bash), the command-line shell used in many Linux and Unix operating systems, could leave systems running those operating systems open to exploitation by specially crafted attacks. “This issue is especially dangerous as there are many possible ways Bash can be called ...