A zero-day vulnerability is reported against Linux and Android, but the real risk lies in known issues that users have not yet patched.
Some vulnerabilities have a bigger impact that others, and not every flaw that a researcher claims is critical represents an immediate risk to users.
There are so many reasons to use a Linux-based operating system. Most often, people tell me that they switched because of a dissatisfaction with Microsoft's Windows. The second most common reason people tell me that they use Linux is for security -- a lack of malware. While operating systems such as Ubuntu, Fedora and Debian are rock solid, no operating system is impervious to viruses or trojans. The moment you feel 100 percent safe, you have effectively let your guard down.
As we reported a few days ago, Ian Murdock, the creator of the Debian GNU/Linux distribution project, died in rather unclear circumstances last week. Until more details emerge, it seems wise to refrain from speculation about what really happened. Far better to celebrate what is not in doubt: his important contribution to free software at a critical period in its growth.
Two releases ago, Fedora 21 introduced its namesake project's "Fedora Next" plan. The goal was simple—bring the massive, sprawling entity that is Fedora into some neatly organized categories that would clearly define the project's aims. And since Next launched, Fedora has been busy doing just that. The results are impressive, and it feels like the distro has found a renewed sense of purpose.
A very interesting discussion started earlier today, October 6, on the Ubuntu Snappy Core mailing list about a method of adding kernel modules to a Snappy-based operating system.
Geoffrey J. Teale started the discussion asking Ubuntu Snappy developers if he could add Linux kernel modules to a system based on Snappy Core via a framework. The current method of adding kernel modules to an Ubuntu Snappy system would be by packaging them in a standard snap, which can be manually injected into the kernel packages using the "sudo insmod" command.