Red Hat Product Security has published details of an "important" security vulnerability in the Linux kernel. The IPv6 implementation of the DCCP protocol means that it is possible for a local, unprivileged user to alter kernel memory and escalate their privileges.
Known as the "use-after-free" flaw, CVE-2017-6074 affects a number of Red Hat products including Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 7 and Red Hat Openshift Online v2. Mitigating factors include the requirement for a potential attacker to have access to a local account on a machine, and for IPV6 to be enabled, but it is still something that will be of concern to Linux users.
O&O Software GmbH has unveiled O&O AutoBackup 6.0, a major new version of its file-based backup and sync tool for Windows.
Version 6.0 adds support for advanced job management, restructures the user interface and backup process, plus includes further minor improvements to make backing up data easier and safer.
Most Commented Stories
Today in Tech History
Samsung started manufacturing new mobile processors using the 10nm FinFET technology last year, but it is not only until today that we learn about its first product to take advantage of it. It's called Exynos 9 Series 8895, and it is the high-end chip likely to power its upcoming flagship, the Galaxy S8.
Being a flagship mobile processor, the Exynos 9 Series 8895 has all the bells and whistles and the performance credentials to match its status. The boost in performance can be attributed to the transition to the 10nm FinFET manufacturing technology, which made way for a 27 percent improvement in terms of performance and a 40 percent decrease in power consumption, compared to the 14nm FinFET process.
Dynamic Theme is a free Windows 10 app which enables using Bing or Windows Spotlight images as desktop wallpaper, on the Windows Lock Screen, and more.
Installation is simple, and entirely safe. Dynamic Theme doesn’t change any of your settings immediately, and so you’re not left wondering how to get everything back to normal.
I like to think that while I do certainly criticize technology products and technology companies for any failings -- Microsoft forcing Windows 10 on to customers against their will last year, for example -- I’m fair. I still get as excited about a new phone, or a new version of Windows, as I did in the past, and I don't deliberately look for negatives. The same is true for all other BetaNews writers.
However, a new study finds that tech reporting is generally more pessimistic now than in the past, and for two very different reasons.
Organizations can avoid 94 percent of critical Microsoft vulnerabilities just by killing admin rights
When vulnerabilities are found in Microsoft products, collective breaths are held until the company releases security bulletins. But analysis of security issues by software manufacture Avecto shows that the overwhelming majority of these vulnerabilities can be mitigated against by simply removing administrator right from users.
Avecto CEO Mark Austin and CTO Marco Peretti say that organizations need to address the problem of "over privileged users". The duo say that this would help to avoid the security problems caused by 94 percent of critical vulnerabilities in Microsoft products. The research also found that Windows 10 had the highest proportion of vulnerabilities of any operating system.
The latest software vulnerability report from Secunia Research at Flexera Software reveals that the average US private PC user has 75 installed programs on their PC, 7.4 percent of which are no longer patched by the vendor.
More detailed analysis of the findings shows that 7.5 percent of users had unpatched Windows operating systems in the final quarter of 2016, up from 6.1 percent in Q3 of 2016 and down from 9.9 percent in Q4, 2015.
Microsoft is pushing out updates to the Mail and Calendar apps in Windows 10, introducing a number of new features including the Focused Inbox we've already seen in the mobile version of Outlook.
The new features come ahead of "architectural improvements" that will speed up performance, and Microsoft is seen borrowing ideas heavily from Google's Gmail and Calendar tools in a bid to make its own apps more useful and helpful.
Google's Gboard keyboard made its debut on iOS, and it was a few months before the company brought the app to its own Android platform. Today a major update to the iPhone version of the keyboard sees the arrival of voice typing, meaning that users will be able to dictate messages rather than typing by hand.
In addition, the update introduces new emoji, support for additional languages, as well as easy access to Google Doodles and information about them.
Almost half (47.48 percent) of all phishing attacks in 2016 were aimed at stealing victim's money, and the amount of financial phishing attacks increased by 13.14 percent according to a new report.
The study by Kaspersky Lab analyzed attacks registered in 2016 by the company's heuristic detection technologies.
As enterprises move to Windows 10, and take full advantage of the advanced security features offered in the operating system and in Microsoft Edge, cyber criminals will increasingly look towards the mobile ecosystem for exploits.
This is according to Fujitsu's latest report, which believes 2017 will see an even bigger increase in attacks against the mobile world.
A study by London University's Institute of Advanced Legal Studies (IALS) shows that journalists find it harder to protect their sources in the digital age, and suggests that whistleblowers should be afforded greater legal protection. The arrival of Donald Trump on the scene has created a greater sense of urgency.
The report, entitled "Protecting Sources and Whistleblowers in a Digital Age", says that monitoring of phone calls as well as online surveillance means it is now easier to identify sources that would otherwise have remained anonymous. People like Edward Snowden and Julian Assange have brought whistleblowing into the spotlight in recent years, and proposed changes to the UK's Official Secrets Act that would deny using "public interest" as a defense, coupled with the increased interest in surveillance mean that this is a hot topic once again.
Ever since I bought my MacBook Pro with Touch Bar, I have been obsessed with USB-C. Since it is the only connection type Apple's laptop offers, its kind of hard not to be. Still, I find it absolutely amazing that a single connection type can be so versatile. I can use it to charge the computer, output video, connect storage, and more.
There are no shortages of USB-C dongles and accessories on the market, and today, IOGEAR adds another. The accessory-maker announces the Portable USB-C Dual DisplayPort Monitor Dock, and it is rather clever. It features dual DisplayPort connections, plus a USB Type-A port for legacy devices. It is even designed in such a way as to hold the cable when not in use.
The tech industry has long been a favorite target for patent trolls. While tech companies strive to innovate, patent trolls see opportunities to monetize the patents they’ve acquired by suing operating tech companies.
Today, patent trolls are responsible for over 84 percent of patent litigation in the U.S. A study published by the Boston University School of Law showed that over six times as many patent lawsuits are filed in recent years than in 1980. More than 10,000 companies have been sued at least once by a troll and the rates of these suits are growing by double-digits every year. Patent trolls drain over $80 billion in wealth a year, siphoning valuable resources away from initiatives like R&D and product improvement.
If you're looking for a way to get started in Cloud computing, or to get more out of an existing setup, Cloud Management and Security from Wiley is an essential read.
Written by an expert with over 15 years’ experience in the field, the book usually retails for $109, but for a limited time you can download the full ebook version for free.