Check Point reveals VoidLink, a China-linked Linux malware built for cloud environments with modular plugins, rootkit ...
A GitHub user managed to dupe security researchers by publishing fake proofs-of-concept (PoCs) containing Linux backdoors. Cybersecurity researchers use PoCs to test and better understand publicly ...
WTF?! A well-known hacker has done the impossible. He got a stripped-down version of Linux to run on a 4-bit Intel chip from the early 1970s. Sure, it takes nearly five days for the kernel to boot, ...
Open-source code has become a malware vector. For example, by the closest of shaves, an open-source developer discovered that Jia Tan, a chief programmer and maintainer of the Linux xz data ...
It’s the most anticipated matchup in the hacker world: Linux vs. Mac OS X vs. Vista. Who will get hacked first? That’s what organizers of the CanSecWest security conference hope to discover this week ...