Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Good news for me. (Score 1) 32

They're not doing anything against that. ESM packages are simply from a separate, paid for, repository. They're not even stopping you from doing "apt download xxx" on a subscribed machine and installing it elsewhere. It simply becomes hassle free when you have a subscription. Regarding kernel patches, the advantage of Ubuntu Advantage is that you don't need to reboot. It's live patching. Similar (or same?) as what Oracle offers for their Unbreakable Linux.

Submission + - Encrypted messaging app designed by law enforcement used to monitor communicatio (abc.net.au)

iiTool writes: As part of a three-year collaboration between the Australian Federal Police (AFP) and Federal Bureau of Investigation (FBI), authorities say underworld figures were tricked into communicating via an encrypted app that had been designed by police.

The app, known as AN0M, was used by organised crime gangs around the world to plan executions, mass drug importations and money laundering.

Authorities say they were able to read up to 25 million messages in real-time.

Police said they uncovered 21 murder plots and seized more than 3,000 kilograms of drugs and $45 million in cash and assets seized.

Last night, more than 300 search warrants were carried out across Australia, with simultaneous stings in the US and Europe.

Comment Re: Prove it (Score 1) 87

Where would you feel safer walking through the streets with your wife and children? Saudi Arabia or Israel? Which country is known for detaining people for arbitrary reasons with no charge for months at a time? Which country is known for torture? Which country's rulers have absolute power over life and death of its inhabitants? Your "evilness" statement is utter nonsense.

Submission + - Anatomy of a Linux Ransomware Attack (linuxsecurity.com)

b-dayyy writes: Ransomware has dominated cybersecurity news headlines for the past decade, and for good reason. Through a combination of advanced encryption and effective extortion mechanisms, a ransomware attack can have devastating consequences for any victim including data loss, reputation harm, recovery costs and significant downtime.

While 85% of ransomware attacks target Windows systems, Linux is becoming an increasingly popular target due to the high value of the devices it powers — namely, servers that administer enterprise and government networks, web services and massive databases owned by organizations that can afford to pay to have operations and critical data restored after an attack. Although ransomware variants that target Linux devices are still in the minority, Linux ransomware has proven to be diverse and sophisticated in its distribution techniques and extortion methods. In this article, we’ll examine the anatomy of a Linux ransomware attack, explore the magnitude of the ransomware risk Linux users face compared to Windows users and offer some tips and advice for protecting against Linux ransomware.

Slashdot Top Deals

The use of money is all the advantage there is to having money. -- B. Franklin

Working...