Privacy, Security Archive

Desktop Port Proliferation a Security Risk?

Opera's announcement of in-browser support for Bittorent highlights the trend for common desktop applications requesting an ever-larger number of TCP ports to be opened up for them, essentially poking holes into firewalls. File transfer apps, VoIP, games, and other programs routinely request open ports, and that's a security risk, say some security experts.

Study Shows Windows Beats Linux on Security

Linuxlookup.com is reporting Wipro surveyed 90 companies in the U.S. and Western Europe with 2,500 to 113,000 employees where both the Windows and open source operating systems were simultaneously being run. The outcome: Windows beats Linux in Security. "We already know how to secure a Windows-based solution and keep it running smoothly,” says Stephen Shaffer, the airline’s director of software systems. “With Linux, we had to rely on consultants to tell us if our system was secure. With Windows, we can depend on Microsoft to inform us of and provide any necessary updates."

IBM Gives Your Information to the Government

Software developed by S.R.D. (Systems Research and Development), recently acquired by IBM, allows huge collections of personal data (travel manifests, medical data) to be compared with other databases, such as terrorist watch lists, while not actually disclosing the data between two entities. What's actually compared is a one-way hash, and any "hits" between two lists, would identify a record number that would presumably lead to a request for the whole record. S.R.D. was originally funded by the CIA's In-Q-Tel venture capital arm.

FreeBSD: Fix for Hyper-Threading Vuln. Considered Non-Trivial

KernelTrap reports: Colin Percival continues the discussion regarding the shared-cache vulnerability inherent in multi-core processors, offering potential mitigation techniques in the form of fixes to the FreeBSD schedulers. Based on Percival's original discovery, information leakage between threads which share a processor core and the subsequent opportunity to monitor memory access patterns can be prevented by eliminating the co-scheduling of threads that have differing privileges.

No ELF Vulnerability in Linux Kernel (Updated)

Update: It appears that we mischaracterized the conclusions in our title and our summary on this story. Greg KH was referring only to the ELF vulnerability in this story. Whether we were deliberately mislead by the submitter of this story or not, we regret the error.

The original story: According to "Greg KH," co-maintainer of the 2.6.x.y series of important stability and security fixes, the Linux kernel does not suffer from the much-hyped hyper threading vulnerability that affected the BSDs: " The main reason there have not been any updates, is that there really isn't a problem for the 2.6 kernel. The original author has admited this finally, no one was ever able to reproduce it on a 2.6 kernel. The only reason I released a kernel update, was at the time, we thought there was an off-chance that there was a problem. However in further testing, it has not been the case." This confirms Linus's earler assertion.