Some financial services companies are looking to migrate their ATM fleets from Windows to Linux in a bid to have better control over hardware and software upgrade cycles.
Pushing them in that direction apparently is Microsoft's decision to end support for Windows XP on April 8, said David Tente, executive director, USA, of the ATM Industry Association (ATMIA).
A Linux worm that targets routers and set-top boxes is now looking for full-fledged computers to use its new feature, a cryptocurrency mining function, according to Symantec.
Symantec spotted the worm, which it calls Darlloz, in November. It was preloaded with usernames and passwords for routers and set-top boxes that run Linux on Intel’s x86 chip architecture and other embedded device architectures such as PPC, MIPS and MIPSEL.
A variety of Linux distributions are vulnerable to hacks because of a bug that allows people to bypass security protocols to intercept and disseminate encrypted information. A member of the Red Hat security team discovered a bug in the GnuTLS library that allows hackers to easily circumvent the Transport Layer Security (TLS) and secure sockets layer (SSL).
I've been preaching the gospel of Linux security for decades now, but it's always nice to see proof-positive from an independent organization that Linux is indeed the most secure operating system around.
The Communications-Electronics Security Group (CESG), the group within the UK Government Communications Headquarters (GCHQ) that assesses operating systems and software for security issues, has found that while no end-user operating system is as secure as they'd like it to be, Ubuntu 12.04 is the best of the lot.
The “Everyday Linux User” website is dedicated to the average, ordinary, everyday, computer user who has a basic working knowledge of computers and who uses their computer for common tasks such as listening to music, playing games, watching videos, writing documents and editing photos and video clips.
Quite a common question asked at sites such as Reddit and Yahoo answers is “Which distro should I use?” and it is usually followed up by a brief set of requirements and the names of distributions that the user has heard of.