Practical Technology

for practical people.

Entries Tagged as 'Security'

Virtual servers: No safer than any other kind

August 13th, 2014 · Comments Off

Once upon a time, we used to think in terms of one hardware server equals one server operating system. Then, along came KVM, Hyper-V, VMware, and all the rest of the virtual machine (VM) hypervisors and more recently Docker with its containers. Now the idea of a single server operating system on a solo box is […]

[

Tags: Cloud Computing · Infrastructure · Security · Server · Virtualization

BadUSB: Big, bad USB security problems ahead

July 31st, 2014 · Comments Off

It’s a common scene from TV: Our hero sneaks into the villain’s office, plugs in a USB stick and — flash! — all the secret plans to conquer Chicago are sucked down into the thumb-drive. The only fiction is how fast it takes to download data. In the real world, office data thieves walk out […]

[

Tags: Infrastructure · Security

Google fixes Android’s Fake ID security hole

July 29th, 2014 · Comments Off

Bluebox Security, a mobile security company, has found a serious Android security hole that dates all the way back to Android 2.1. This hole, Fake ID, can be used by malware to impersonate trusted applications without any user notification. Can you say bad news? I knew you could. By enabling malware to act like already […]

[

Tags: Business · Google · Infrastructure · Linux · Operating System · Security · SmartPhone · Tablet

Homeland Security gets into software security

July 24th, 2014 · Comments Off

PORTLAND — No, I am not making this up. At OSCon, The Department of Homeland Security (DHS), best known to you as the people checking up on you between the airport parking lot and your flight, quietly announced that they’re now offering a service for checking out your open-source code for security holes and bugs: the […]

[

Tags: Development · Open Source · Security

Linux and botnets: It’s not Linux’s fault!

March 20th, 2014 · Comments Off

I couldn’t blame you, if — based on recent headlines such as “Linux worm Darlloz targets Intel architecture to mine digital currency” and “Botnet of thousands of Linux servers pumps Windows desktop malware onto web” — you thought Linux was as full of holes as Windows XP. If you take a closer look, you’ll find […]

[

Tags: Infrastructure · Internet · Network · Security · Server · Web Services