Eight out of the ten most exploited vulnerabilities tracked by threat intelligence in 2018 targeted Microsoft products.
Windows has too many potential attack points, most of which are not directly overseen by the very company who develops the operating system. The vast majority of the code cannot be audited by the community. There are fewer checks and balances in place to ensure that these attacks are prevented. After seeing how Ubuntu and various other Linux distributions ensure the security of their users, the Microsoft Windows approach starts to seem a lot less sane.
While it's unknown how long CPUs without AES support will be around, there will likely always be a "low end". it's immensely valuable to provide a software-optimized cipher that doesn't depend on hardware support. Lack of hardware support should not be an excuse for no encryption.
The security of any operating system (OS) layer depends on the security of every layer below it. At the heart of the Trusted Computing environment is a small hardware component called a Trusted Platform Module (TPM). The TPM is a chip connected by bus to the system motherboard, and sometimes it can be retrofitted as a module.
Tripwire, an excellent tool for protecting Linux file filesystems.
Scrape LinkedIn to build out a name list to be massaged into an email list for a mass phishing campaign.
usbkill is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.
The USBGuard software framework helps to protect your computer against rogue USB devices (a.k.a. BadUSB) by implementing basic whitelisting and blacklisting capabilities based on device attributes.
Subgraph is a desktop computing and communication platform designed to be highly resistant to network-borne exploits and malware/ransomware attacks.
How Linux still supports ancient hardware.
Security teams are no longer interested in closed, heavyweight tools developed for highly specialized purposes. They want useful, lightweight, nimble, and open tools that can be easily dropped into their particular workflow where certain requirements need to be addressed.
Linux is no stranger to data recovery. In fact, there are a number of solid tools you can use to get back lost data.
An advanced form of security defense is hardware-based protection, where a tamper-proof physical security key (also known as "security token" or "hardware token") acts as a protection layer for secret software keys or login credentials. The hardware based security can be useful in various contexts, for example to implement things like two-factor authentication, VPN access control, secure password vault, and so on.
A dropbox is a small computer designed to be connected to a corporate network, once connected it should enable attackers remote access to the network through a variety of methods.
Tomb is a 100% free and open source system for file encryption on GNU/Linux, facilitating the backup of secret files. Tomb generates encrypted storage folders to be opened and closed using their associated keyfiles, which are also protected with a password chosen by the user.
‘Steghide’ is a pretty useful tool (steganography program) that lets you encrypt and hide a file inside another file’s content, so it’ll be ‘invisible’ to others (under most situations) thus helping while enhancing the security of your sensitive data.
With pass, each password lives inside of a gpg encrypted file whose filename is the title of the website or resource that requires the password. These encrypted files may be organized into meaningful folder hierarchies, copied from computer to computer, and, in general, manipulated using standard command line file management utilities.
The following operating systems have been designed to help you be anonymous on the Internet, they come with Tor, encryption and lots of countermeasures that stop online tracking.
openmediavault is the next generation network attached storage (NAS) solution based on Debian Linux. It contains services like SSH, (S)FTP, SMB/CIFS, DAAP media server, RSync, BitTorrent client and many more. Thanks to the modular design of the framework it can be enhanced via plugins.
Based on reviews and automated analysis, the best security tools are collected on this page. This list is populated with tools that are publicly available (open source software). It is updated and ranked weekly.