Eight new variants of Spectre affecting Intel chips have been found by a team of security researchers. These new vulnerabilities have been named Spectre Next Generation and make it possible to run an exploit on a virtual machine and attack the host system from there.
Microsoft continues to take steps to get closer to Linux supporters. The latest surprise was the announcement of Azure Sphere, an operating system , based on Linux, whose objective is to improve the security of the Internet of Things.
On Monday, March 26 Luxembourg will host the third edition of the Open Source Security Software Hackathon. The event, organized by the hack.lu team will bring groups of developers together to work collaboratively on the resolution of incidents in the field of Free Software and Open Source cybersecurity.
When our computer stops working, the disk is damaged, we suffer a data loss from the main unit or it becomes infected with a virus, we look for a fast and effective solution. Since prevention is better than cure, it is convenient to backup all data in our device to avoid problems.
Although Linux is considered the safest operating system, it has recently been proven that it is not always safe from vulnerabilities. Therefore, it is important to adopt security measures that guarantee that the servers and users’ devices are well protected. For this, one of the first steps that should be considered is to protect the file system.
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.