What, Why, and How. What is Popi compliance? The POPI Act sets out the minimum standards regarding accessing and ‘processing’ any personal information belonging to another. The Act defines ‘processing’ as collecting, receiving, recording, organizing, retrieving, or the use, distribution, or sharing of any such information POPI compliance ensures individuals can control how information about them is used and those holding … Read More
10-year-old Sudo bug lets Linux users gain root-level access.
A major vulnerability impacting a large chunk of the Linux ecosystem has been patched today in Sudo, an app that allows admins to delegate limited root access to other users. The vulnerability, which received a CVE identifier of CVE-2021-3156, but is more commonly known as “Baron Samedit,” was discovered by security auditing firm Qualys two weeks ago and was patched earlier today … Read More
CentOS Is Gone — But RHEL Is Now Free For Up To 16 Production Servers
Last month, Red Hat caused a lot of consternation in the enthusiast and small business Linux world when it announced the discontinuation of CentOS Linux. Long-standing tradition — and ambiguity in Red Hat’s posted terms — led users to believe that CentOS 8 would be available until 2029, just like the RHEL 8 it was based on. Red Hat’s early termination of … Read More
Fileless Malware on Linux: Anatomy of an Attack
Recent years have demonstrated that Windows users are not the only ones who should be concerned about malware. Linux is becoming an increasingly popular target among malware operators due to the growing popularity of the open-source OS and the high-value devices it powers worldwide. Security researchers from AT&T Alien Labs are now warning that “cyber gangs have started infecting Linux machines via … Read More
Malwarebytes said it was hacked by the same group behind the breach of Solarwinds
Malwarebytes becomes fourth major security firm targeted by attackers after Microsoft, FireEye, and CrowdStrike United States based cyber-security firm Malwarebytes confirmed yesterday that it was hacked by the same group which breached IT software company SolarWinds last year. Malwarebytes said its intrusion is not related to the SolarWinds supply chain incident since the company doesn’t use any of SolarWinds software … Read More
WhatsApp’s new privacy policy requires you to share data with Facebook.
This comes into effect on February 8 2021. Millions of WhatsApp users have started receiving a notification from WhatsApp asking them to either accept its new Terms of Service and Privacy Policy by February 8, or lose access to the app completely. The in-app notification from the Facebook-owned platform, sent both to Android and iOS users, mentions key updates, such as how … Read More
Red Hat Enterprise Linux 7.6 Enters Beta with Linux Container Innovations
Red Hat announced today the availability of Red Hat Enterprise Linux 7.6 operating system for beta testing for Red Hat Enterprise Linux customers. Red Hat Enterprise Linux 7.6 is the sixth maintenance update in the Red Hat Enterprise Linux 7 operating system series, promising innovative technologies for Linux containers and enterprise-class hybrid cloud environments, new security and compliance features, as … Read More
Linux Kernel 4.14 LTS Expected to Arrive Early Next Month, RC4 Ready for Testing
A day later than expected, the fourth RC (Release Candidate) build of the upcoming Linux 4.14 LTS kernel series has been announced earlier today by Linus Torvalds, who gives us an insight into the development cycle. According to Linus Torvalds, things are starting calming down for the development cycle of Linux kernel 4.14, which will be the next long-term support … Read More
Open Source File Share Nextcloud to Add End-to-End Encryption
There’s another reason for taking a second look at Nextcloud as a replacement for DropBox — or even for Google’s office apps or Microsoft’s Office 356. Full encryption is on the way to the open source host-it-yourself client/server software. A year-and-a-half ago when Nextcloud was first forked from ownCloud, it was basically for syncing, storing and sharing files. “The elevator … Read More
WannaCry Kill-Switch(ed)? It’s Not Over! WannaCry 2.0 Ransomware Arrives
If you are following the news, by now you might be aware that a security researcher has activated a “Kill Switch” which apparently stopped the WannaCry ransomware from spreading further. But it’s not true, neither the threat is over yet. However, the kill switch has just slowed down the infection rate. Updated: Multiple security researchers have claimed that there are more … Read More
Red Hat Forum – Johannesburg 2017
DcData had an awesome time at the Red Hat Forum in Johannesburg yesterday! Excellent presentations and amazing technology!
4 ways to improve your security online right now
The last few years have seen a massive jump in the frequency of reports about digital security breaches and personal privacy issues, and no doubt this trend will continue. We hear about scammers moving to social media, nations using cyberattacks as part of coordinated offensive strategies, and the rise of companies making millions tracking our online behavior. Feeling apathetic about … Read More
Understanding Linux containers
Applications are getting more complex. Demand to develop faster is ever-increasing. This puts stress on your infrastructure, IT teams, and processes. Linux® containers help you alleviate issues and iterate faster—across multiple environments. What are Linux containers? Linux containers are technologies that allow you to package and isolate applications with their entire runtime environment—all of the files necessary to run. This … Read More