After running the service in preview mode for over a year, Google is making its IaaS (infrastructure-as-a-service) Google Compute Engine (GCE) available as a full-fledged commercial service. The company has established a service level ...
Oracle has ported one of its most coveted Solaris tools to the Linux platform, a real-time debugging tool called DTrace, though the company has made it officially available only for its own Oracle Linux distribution. With the release of ...
Tags: Oracle, Solaris tools, Linux platform
Versions 2.0.5 and earlier of the popular VLC media player software contain a critical vulnerability that can be potentially exploited by attackers to execute malicious code on computers. The vulnerability is located in the VLC component ...
Tags: VLC media player software, vulnerability, malicious code
Graphics chip maker Nvidia released a new version of its Unix driver on Friday in order to address a high-risk vulnerability that can be exploited by local users to gain root privileges on Linux systems. The privilege escalation ...
Tags: graphics chip, Nvidia, Unix driver, high risk vulnerability
A new approach to mobile Internet protocols could improve the usability and reliability of mobile applications. At the annual Usenix tech conference last month in Boston, two MIT researchers formally unveiled a new protocol, and a remote ...
Tags: mobile Internet protocols, new approach, MIT
Hackers have compromised two servers used by the FreeBSD Project to build third-party software packages.Anyone who has installed such packages since Sept.19 should completely reinstall their machines,the project's security team warned. ...
Tags: hackers, FreeBSD, third-party software packages, SSH Keys
Hackers of the world,unite!You have nothing to lose but the lousy stock firmware your routers shipped with. Apart from smartphones,routers and wireless base stations are undoubtedly the most widely hacked and user-modded consumer ...
Tags: DD-WRT, Vyatta, security, Hackers, routers, Tomato, OpenWRT, M0n0wall, PfSense