Kali Linux is a distribution based on Debian and specially designed for computer security audits. Developed by Offensive Security, it incorporates a wide catalog of tools to carry out computer forensics, penetration and reverse engineering testing… It can be truly useful for professionals in charge of IT security in an organization, administrators and network architects, security auditors, or anyone interested in learning about how to discover and even exploit vulnerabilities.
During the first half of this year 2020, the security firm Trend Micro blocked 8.8 million cyber threats that took advantage of Covid-19 to infect computers. Spam through email was the main way used to carry out different types of fraud, accounting for almost 92% of the total.
This data comes from the report for the first six months of the year published by Trend Micro, which shows how cybercriminals changed their strategies since the beginning of the year to take advantage of the interest aroused by the pandemic around the world.
The Lockdown security module introduced in Linux 5.4 to lock certain parts of the kernel seems not to be as effective as expected. A developer has managed to skip this protection on Ubuntu 18.04 and break Secure Boot. To do this, he has used ACPI tables, the standard that controls the operation of the BIOS and provides advanced functionalities to manage and save energy.
The security firm Check Point warns of a significant increase in the number of cyber-attacks that take advantage of the search for information about the Covid-19 to infect more and more users. During the last three weeks, there have been 30% more threats, specifically about 192,000 weekly. 17% of the newly registered domains related to Coronavirus are malicious or suspicious and new phishing campaigns have been discovered that impersonate the World Health Organization (WHO) and popular video conferencing platforms to steal sensitive information.
The current health crisis, due to the expansion of Covid-19, is responsible for the rise of remote work. The Governments of the affected territories recommend it, and even impose it, and companies are quick to seek a fast solution so that their staff can continue to carry out their work from home.
In a matter of days, teleworking has gone from being a minority practice to becoming the only formula for employees that due to the characteristics of their job can adopt it and keep on working.
Companies and users are increasingly aware of the need to be extremely cautious when surfing the Internet and to properly protect their connected devices. The FIDO security keys are a way to provide extra protection against practices such as phishing. These are physical devices with an appearance similar to USB that users can connect to their terminals and are responsible for carrying out the double factor authentication (2FA).
With the aim of improving this technology and accelerating its adoption, Google has launched OpenSK, an Open Source project so that any organization or developer can create their own security keys compatible with FIDO U2F and FIDO2.
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.