Red Hat Product Security was made aware of a vulnerability affecting the Linux kernel’s implementation of the Bluetooth L2CAP protocol. The vulnerability was named BlueBorne and was assigned an ID – CVE-2017-1000251.
A vulnerable system would need to have Bluetooth (hardware + service) enabled and an attacking device would need to be within
Continue reading “BlueBorne – An Analysis”
Most people don’t consider their average USB memory stick to be a security threat. In fact, in a social engineering experiment conducted in 2016 at the University of Illinois and detailed in this research paper, a group of researchers dropped 297 USB sticks outside in the parking lot, in the hallway, and classrooms. Of the 297 USB sticks dropped,
Continue reading “Built-in protection against USB security attacks with USBGuard”
Red Hat has sailed into December with prestigious industry recognition for helping customers modernize and simplify their IT infrastructure. Even if they’re not quite ready for the cloud today, we provide the elements of a stable and flexible foundation with security features for when they are. This week our commitment to customers at all stages of their cloud journey was recognized with two European IT awards.
Continue reading “The winning team for any kind of cloud”