Windows Server will add the Linux subsystem, join the Insider program

(credit: Microsoft) SEATTLE—When Microsoft first introduced the Windows Subsystem for Linux (WSL) at last year’s Build developer conference , it said that it was doing so to make developers who were familiar with the Linux command line feel comfortable on Windows . The immediate and inevitable question was “Well, what about Windows Server?” Development is one thing, but what if organizations wanted to occasionally deploy their Linux software on Windows? Although Windows Server 2016 and Windows 10 share many components, the Server operating system hasn’t thus far included WSL, consistent with the “developer only” rationale. But that’s going to change: at Build this week, Microsoft announced that WSL will be included in Server later this year. Microsoft still isn’t positioning this as a way of running Linux server in production on Windows; rather, the company says the addition will be useful for administrative tasks. With WSL, Windows can run scripts written for Linux. But we’re hard-pressed to see things stopping there; it seems inevitable that at some point, Windows will offer the ability to run Linux server software as one of its features. Read 3 remaining paragraphs | Comments

Read More:
Windows Server will add the Linux subsystem, join the Insider program

Today’s Massive Ransomware Attack Was Mostly Preventable—Here’s How To Avoid It

Ransomware may be mostly thought of as a (sometimes costly) nuisance, but when it hinders the ability of doctors and nurses to help people with an emergency medical problems, that qualifies as armed robbery. Read more…

Read the original:
Today’s Massive Ransomware Attack Was Mostly Preventable—Here’s How To Avoid It

NYU Accidentally Exposed Military Code-breaking Computer Project To Entire Internet

An anonymous reader writes: A confidential computer project designed to break military codes was accidentally made public by New York University engineers. An anonymous digital security researcher identified files related to the project while hunting for things on the internet that shouldn’t be, The Intercept reported. He used a program called Shodan, a search engine for internet-connected devices, to locate the project. It is the product of a joint initiative by NYU’s Institute for Mathematics and Advanced Supercomputing, headed by the world-renowned Chudnovsky brothers, David and Gregory, the Department of Defense, and IBM. Information on an exposed backup drive described the supercomputer, called — WindsorGreen — as a system capable of cracking passwords. Read more of this story at Slashdot.

Read More:
NYU Accidentally Exposed Military Code-breaking Computer Project To Entire Internet

Windows Server will add the Linux subsystem, join the Insider program

(credit: Microsoft) SEATTLE—When Microsoft first introduced the Windows Subsystem for Linux (WSL) at last year’s Build developer conference , it said that it was doing so to make developers who were familiar with the Linux command line feel comfortable on Windows . The immediate and inevitable question was “Well, what about Windows Server?” Development is one thing, but what if organizations wanted to occasionally deploy their Linux software on Windows? Although Windows Server 2016 and Windows 10 share many components, the Server operating system hasn’t thus far included WSL, consistent with the “developer only” rationale. But that’s going to change: at Build this week, Microsoft announced that WSL will be included in Server later this year. Microsoft still isn’t positioning this as a way of running Linux server in production on Windows; rather, the company says the addition will be useful for administrative tasks. With WSL, Windows can run scripts written for Linux. But we’re hard-pressed to see things stopping there; it seems inevitable that at some point, Windows will offer the ability to run Linux server software as one of its features. Read 3 remaining paragraphs | Comments

Taken from:
Windows Server will add the Linux subsystem, join the Insider program

Today’s Massive Ransomware Attack Was Mostly Preventable—Here’s How To Avoid It

Ransomware may be mostly thought of as a (sometimes costly) nuisance, but when it hinders the ability of doctors and nurses to help people with an emergency medical problems, that qualifies as armed robbery. Read more…

View original post here:
Today’s Massive Ransomware Attack Was Mostly Preventable—Here’s How To Avoid It

Google Found Over 1,000 Bugs In 47 Open Source Projects

Orome1 writes: In the last five months, Google’s OSS-Fuzz program has unearthed over 1, 000 bugs in 47 open source software projects… So far, OSS-Fuzz has found a total of 264 potential security vulnerabilities: 7 in Wireshark, 33 in LibreOffice, 8 in SQLite 3, 17 in FFmpeg — and the list goes on… Google launched the program in December and wants more open source projects to participate, so they’re offering cash rewards for including “fuzz” targets for testing in their software. “Eligible projects will receive $1, 000 for initial integration, and up to $20, 000 for ideal integration” — or twice that amount, if the proceeds are donated to a charity. Read more of this story at Slashdot.

Follow this link:
Google Found Over 1,000 Bugs In 47 Open Source Projects

Trump Signs Executive Order On Cybersecurity

President Trump on Thursday signed a long-delayed executive order on cybersecurity that “makes clear that agency heads will be held accountable for protecting their networks, and calls on government and industry to reduce the threat from automated attacks on the internet, ” reports The Washington Post. From the report: Picking up on themes advanced by the Obama administration, Trump’s order also requires agency heads to use Commerce Department guidelines to manage risk to their systems. It commissions reports to assess the country’s ability to withstand an attack on the electric grid and to spell out the strategic options for deterring adversaries in cyberspace. [Thomas Bossert, Trump’s homeland security adviser] said the order was not, however, prompted by Russia’s targeting of electoral systems last year. In fact, the order is silent on addressing the security of electoral systems or cyber-enabled operations to influence elections, which became a significant area of concern during last year’s presidential campaign. The Department of Homeland Security in January declared election systems “critical infrastructure.” The executive order also does not address offensive cyber operations, which are generally classified. This is an area in which the Trump administration is expected to be more forward-leaning than its predecessor. Nor does it spell out what type of cyberattack would constitute an “act of war” or what response the attack would invite. “We’re not going to draw a red line, ” Bossert said, adding that the White House does not “want to telegraph our punches.” The order places the defense secretary and the head of the intelligence community in charge of protecting “national security” systems that operate classified and military networks. But the secretary of homeland security will continue to be at the center of the national plan for protecting critical infrastructure, such as the electric grid and financial sector. Read more of this story at Slashdot.

View article:
Trump Signs Executive Order On Cybersecurity

‘WannaCry’ ransomware attack spreads worldwide (update)

England’s healthcare system came under a withering cyberattack Friday morning, with ” at least 25 ” hospitals across the country falling prey to ransomware that locked doctors and employees out of critical systems and networks. The UK government now reports that this is not a (relatively) isolated attack but rather a single front in a massive regionwide digital assault. #nhscyberattack pic.twitter.com/SovgQejl3X — gigi.h (@fendifille) May 12, 2017 The attack has impacted hospitals and transportation infrastructure across Europe, Russia and Asia. Organizations in dozens of countries have all been hit with the same ransomware program, a variant of the WannaCry virus, spouting the same ransom note and demanding $300 for the encryption key, with the demand escalating as time passes. The virus’s infection vector appears to through a known vulnerability, originally exploited and developed by the National Security Agency. That information was subsequently leaked by the hacking group known as Shadow Broker which has been dumping its cache of purloined NSA hacking tools onto the internet since last year. The virus appears to have originally spread via email as compressed file attachment so, like last week’s Google Docs issue, make sure you confirm that you email’s attachments are legit before clicking on them. Also, make sure your computers are using software that’s still receiving security updates, and that you’ve installed the latest updates available. Microsoft released a fix for the exploit used as a part of its March “Patch Tuesday” release, but unpatched Windows systems remain vulnerable. Update : Reuters reports a statement from Microsoft indicating that engineers have added detection and protection against the “Ransom:Win32.WannaCrypt” malware, so make sure your Windows Defender or other antivirus is updated before logging on to any corporate networks that may be infected. In a statement, a FedEx representative confirmed its systems are being impacted, saying “Like many other companies, FedEx is experiencing interference with some of our Windows-based systems caused by malware. We are implementing remediation steps as quickly as possible. We regret any inconvenience to our customers.” Source: New York Times

More:
‘WannaCry’ ransomware attack spreads worldwide (update)

Today’s Massive Ransomware Attack Was Mostly Preventable—Here’s How To Avoid It

Ransomware may be mostly thought of as a (sometimes costly) nuisance, but when it hinders the ability of doctors and nurses to help people with an emergency medical problems, that qualifies as armed robbery. Read more…

Visit link:
Today’s Massive Ransomware Attack Was Mostly Preventable—Here’s How To Avoid It

Google Found Over 1,000 Bugs In 47 Open Source Projects

Orome1 writes: In the last five months, Google’s OSS-Fuzz program has unearthed over 1, 000 bugs in 47 open source software projects… So far, OSS-Fuzz has found a total of 264 potential security vulnerabilities: 7 in Wireshark, 33 in LibreOffice, 8 in SQLite 3, 17 in FFmpeg — and the list goes on… Google launched the program in December and wants more open source projects to participate, so they’re offering cash rewards for including “fuzz” targets for testing in their software. “Eligible projects will receive $1, 000 for initial integration, and up to $20, 000 for ideal integration” — or twice that amount, if the proceeds are donated to a charity. Read more of this story at Slashdot.

Read the article:
Google Found Over 1,000 Bugs In 47 Open Source Projects