Everything you need to safely browse the Internet. Protect your privacy. Defend yourself against network surveillance and traffic analysis.
Source: Tor Browser 8.0.7 – Neowin
Slack announced today that it is launching Enterprise Key Management (EKM) for Slack, a new tool that enables customers to control their encryption keys in the enterprise version of the communications app. The keys are managed in the AWS KMS key management tool. Geoff Belknap, chief security officer (CSO) at Slack, says the new tool […]
Source: Slack hands over control of encryption keys to regulated customers | TechCrunch
Qihoo 360 Netlab researchers reported on Friday that they are tracking an uptick in activity associated with what it said is a variant of the Mirai botnet.
Source: Newly Published Exploit Code Used to Spread Mirai Variant | Threatpost
First discovered in 2016, the Mirai botnet took over an unprecedented number of devices and dealt massive damage to the internet. Now it’s back and more dangerous than ever.
Source: What Is the Mirai Botnet, and How Can I Protect My Devices?
Nvidia today introduced the Jetson Nano, a CUDA-X computer for deploying AI on the edge, the company’s latest — and cheapest — solution for edge AI.
Source: Nvidia debuts Jetson Nano for edge AI on embedded devices | VentureBeat
The GNOME Foundation has released the latest version of the GNOME desktop environment, i.e., GNOME 3.32 Taipei. It’s arguably the most popular Linux desktop around and many mainstream distributions — including Ubuntu, Fedora, and openSUSE — feature the same.
Source: GNOME 3.32 ‘Taipei’ Linux Desktop Released With New Features
A modular malware with worm capabilities exploits known vulnerabilities in servers running ElasticSearch, Hadoop, Redis, Spring, Weblogic, ThinkPHP, and SqlServer to spread from one server to another and mine for Monero cryptocurrency.
Source: Malware Spreads As a Worm, Uses Cryptojacking Module to Mine for Monero
The major highlight of the UserLAnd app is that it doesn’t demand root access from you. It’s a big relief as rooting also exposes one’s device to numerous security flaws and warranty hazards. You can use it to install/uninstall apps like any other regular application.
Source: Want To Run Linux On Android Without Rooting? Using UserLAnd
Citrix has been hit by hackers in attacks that potentially exposed large amounts of customer data. What happened and how can firms protect themselves?
Source: Why The Citrix Breach Matters — And What To Do Next