The Free Software Foundation has endorsed fifteen “new” devices under their Respects Your Freedom (RYF) certification. These new devices though amount to another supplier ,Technoethical, … FSF Certifies Another Batch Of Old Hardware For Respecting Your FreedomRead more
Computer
CIA malware BothanSpy and Gyrfalcon targeting Windows and Linux
WikiLeaks has dumped its newest Vault 7 documents, detailing the capabilities of two alleged CIA hacking tools dubbed BothanSpy and Gyrfalcon. The malware payloads have … CIA malware BothanSpy and Gyrfalcon targeting Windows and LinuxRead more
Backdoor built in to widely used tax app seeded NotPetya outbreak
The third-party software updater used to seed last week’s NotPetya worm that shut down computers around the world was compromised more than a month before … Backdoor built in to widely used tax app seeded NotPetya outbreakRead more
CIA’s “Pandemic” turns Windows servers to attack machine
WikiLeaks just published details of a purported CIA operation that turns Windows file servers into covert attack machines that surreptitiously infect computers of interest inside … CIA’s “Pandemic” turns Windows servers to attack machineRead more
Intel x86s hide another CPU that can take over your machine
Recent Intel x86 processors implement a secret, powerful control mechanism that runs on a separate chip that no one is allowed to audit or examine. … Intel x86s hide another CPU that can take over your machineRead more
If Gnu/Linux won’t install on your laptop, blame Intel not Microsoft
Why won’t Linux install on modern Lenovo laptops? The discovery of this problem set off a recent firestorm. But contrary to initial speculation, it’s not … If Gnu/Linux won’t install on your laptop, blame Intel not MicrosoftRead more
Juniper confirms leaked “NSA exploits” affect its firewalls, no patch released yet
Juniper confirmed exploits leaked by the Shadow Brokers group appear to affect its firewalls, but has not yet patched the vulnerabilities. The firewall manufacturer is … Juniper confirms leaked “NSA exploits” affect its firewalls, no patch released yetRead more
Of Course Everyone’s Already Using the Leaked NSA Exploits
Last week, an anonymous group calling itself the Shadow Brokers leaked a bunch of National Security Agency hacking tools. Whoever they are, the Shadow Brokers … Of Course Everyone’s Already Using the Leaked NSA ExploitsRead more
NSA runs its spying activities on Red Hat Linux
A little over two years ago, the first disclosures about the massive surveillance operation being carried out by the NSA were made by Edward Snowden. … NSA runs its spying activities on Red Hat LinuxRead more