Wine 4.13 ya disponible: 15 correcciones y soporte para redirecciones Passport HTTP

Wine 4.13 en Disco Dingo

Muchos usuarios llegamos a Linux después de haber sufrido pasado por Windows. Si hubo una cosa que Bill Gates hizo bien fue hacer que su sistema operativo estuviera disponible en casi todos los ordenadores del mundo, motivo por el cual prácticamente todo el software más popular está para el sistema operativo de escritorio de Microsoft. Por esta razón existe Wine, un software diseñado para ejecutar aplicaciones de Windows que ayer lanzó Wine 4.13.

Wine 4.12 fue lanzado hace poco menos de un mes, el 5 de julio y, si nos basamos en el nuevo ciclo de actualización cada dos semanas, la siguiente versión debería haber llegado el 19 de julio. Si hemos tenido que esperar todo un mes, o cuatro semanas para ser más exactos, es porque Alexandre Julliard, el desarrollador principal del proyecto, ha estado de vacaciones de verano. Por lo que parece, Julliard no fue el único desarrollador de Wine en coger vacaciones, o eso es lo que pensamos al ver que Wine 4.13 no es un lanzamiento muy importante, ni habiéndose retrasado dos semanas.

Novedades incluidas en Wine 4.13

  • Soporte pare redireccinoes Passport HTTP.
  • Varias actualizaciones de encabezado.
  • Correcciones de los siguientes errores:
    • Algunas aplicaciones y juegos fallan al enumerar correctamente las propiedades del driver de pantalla/monitor en el registro usando setupapi.
    • Monitor Test 3.2 falla al enumerar los dispositivos/drivers de vídeo en el registro.
    • WSARecvMsc prohíbe incorrectamente los búfer del control nulos.
    • Corrección para el bloqueo de Honor en “doble libre o corrupción”.
    • Mal rendimiento de Second Sight.
    • A.R.E.S Extinction Agenda 1.x se bloquea en la introducción.
    • Solo errores echo por defecto.
    • TreeSize Free Portable se sale silenciosamente al iniciar por la ausencia del stub shell32.SHMultiFilePropierties.
    • bcrypt siempre elige el modo ECB al usar AES, aunque el programa indique lo contrario.
    • Final Fantasy XIV 5.0 se bloquea en el inicio al usar xaudio2_8.dll.
    • Error de compilación: “AT_NO_AUTOMOUNT” no declarado.
    • Ren’py no es capaz de crear pantallas en Wine 4.11.
    • La compilación armv7hl falla debido a llamadas de función variadic no AAPCS.
    • Muchos juegos D3D11 muestran la pantalla en negro o blanco con Wine 4.12.1.
    • El teclado Amazon Workspaces – ABNT2 no reconoce los caracteres.

La nueva versión de Wine con todas sus correcciones está disponible para Ubuntu, Debian, Fedora, SUSE, Slackware y FreeBDS, además de para Android y macOS, en este enlace.

Artículo relacionado:
Wine 4.9: la nueva versión está oficialmente fuera


from Linux Adictos https://ift.tt/2KmA6DR
via IFTTT

¿La batería de tu Samsung Galaxy S10 se te queda corta? Prueba estos 5 consejos para que dure más

El Samsung Galaxy S10 y S10+ fueron presentados ante el mundo a comienzos de 2019, con potentes baterías de 3.400 mAh y 4.100 mAh respectivamente, y con carga rápida, carga inalámbrica y carga inalámbrica inversa. La autonomía de tu Galaxy S10 parece no ser un problema inicial, aunque puede que se te quede corta en ciertos momentos. Además de los consejos comunes que sirven para ahorrar batería en cualquier teléfono,

Entra en Andro4all para leer el artículo completo

Puedes unirte a nosotros en Twitter, Facebook o en Google+

¡Suscríbete a nuestro canal de YouTube!

Publicado recientemente en Andro4all

from Andro4all https://ift.tt/2YC2CpZ
via IFTTT

Sunny today!

En Veracruz hoy la condición actual es Clear y una temperatura de 25C.

La máxima temperatura será de 31C y la mínima de 25C.
Durante el día la condición se pronostica como Sunny

Sunrise August 3, 2019 at 07:01AM
Sunset August 3, 2019 at 07:59PM

Viento con dirección Southwest y velocidad de 6 Km/h

With a high of 88F and a low of 77F.
via IFTTT

Todos estos móviles tienen KaiOS y también WhatsApp: listado completo

El sistema operativo KaiOS está viviendo un auténtico renacer silencioso, sin llamar mucho la atención. A fecha de mayo de 2019, KaiOS estaba presente en más de 100 millones de dispositivos en todo el mundo, una cifra que demuestra que cada vez más usuarios tienen en cuenta este sistema para móviles no táctiles creado por Kai Technologies. 2019 ha sido clave para KaiOS, un año en el que el sistema

Entra en Andro4all para leer el artículo completo

Puedes unirte a nosotros en Twitter, Facebook o en Google+

¡Suscríbete a nuestro canal de YouTube!

Publicado recientemente en Andro4all

from Andro4all https://ift.tt/2yxiRds
via IFTTT

LG registra una patente para un móvil plegable que sí convence

Los teléfonos plegables siguen siendo noticia. A pesar de que muchos han perdido la esperanza por culpa de Samsung y Huawei con su Galaxy Fold y Mate X respectivamente, todavía hay marcas que piensan que sigue la pena seguir intentándolo con este tipo de tecnologías. Un claro ejemplo es LG, y es que la compañía ha patentado un nuevo diseño destinado para los teléfonos móviles flexibles y contra todo pronóstico,

Entra en Andro4all para leer el artículo completo

Puedes unirte a nosotros en Twitter, Facebook o en Google+

¡Suscríbete a nuestro canal de YouTube!

Publicado recientemente en Andro4all

from Andro4all https://ift.tt/2Zq3bVc
via IFTTT

Xiaomi Mi 9 SE y Xiaomi Mi 9 por 50 euros menos, ¡rebajas en The Phone House!

Ha empezado el principio del fin del verano, estamos en agosto,y ahora llega la temporada alta de las vacaciones de verano. Y, te vayas o no de vacaciones, no hay nada mejor para alegrarse el verano que hacer un cambio y renovar tu smartphone, bien para entretenerte o bien para poder tomar mejores fotografías en las vacaciones, así como orientarte con Google Maps, algo imprescindible en muchas ocasiones. Pues bien,

Entra en Andro4all para leer el artículo completo

Puedes unirte a nosotros en Twitter, Facebook o en Google+

¡Suscríbete a nuestro canal de YouTube!

Publicado recientemente en Andro4all

from Andro4all https://ift.tt/2yyQ0p9
via IFTTT

Xiaomi lanzará un potente secador de pelo de diseño futurista por menos de 170 euros

YouPin, la tienda online de Xiaomi, es la web a la que debes entrar para ver cómo el fabricante chino apuesta por un catálogo de venta bastante variado. Haznos caso, en esa tienda puedes encontrar productos muy, muy raros. Nos hemos dado una vuelta por YouPin y hemos encontrado que Xiaomi no solo prepara el lanzamiento de móviles para la segunda mitad de 2019, también tiene otra sorpresa. Vía crowdfunding,

Entra en Andro4all para leer el artículo completo

Puedes unirte a nosotros en Twitter, Facebook o en Google+

¡Suscríbete a nuestro canal de YouTube!

Publicado recientemente en Andro4all

from Andro4all https://ift.tt/2LXvwPG
via IFTTT

Xiaomi lanzará un potente secador de pelo de diseño futurista por menos de 170 euros

YouPin, la tienda online de Xiaomi, es la web a la que debes entrar para ver cómo el fabricante chino apuesta por un catálogo de venta bastante variado. Haznos caso, en esa tienda puedes encontrar productos muy, muy raros. Nos hemos dado una vuelta por YouPin y hemos encontrado que Xiaomi no solo prepara el lanzamiento de móviles para la segunda mitad de 2019, también tiene otra sorpresa. Vía crowdfunding,

Entra en Andro4all para leer el artículo completo

Puedes unirte a nosotros en Twitter, Facebook o en Google+

¡Suscríbete a nuestro canal de YouTube!

Publicado recientemente en Andro4all

from Andro4all https://ift.tt/2LXvwPG
via IFTTT

What We Can Learn from the Capital One Hack

On Monday, a former Amazon employee was arrested and charged with stealing more than 100 million consumer applications for credit from Capital One. Since then, many have speculated the breach was perhaps the result of a previously unknown “zero-day” flaw, or an “insider” attack in which the accused took advantage of access surreptitiously obtained from her former employer. But new information indicates the methods she deployed have been well understood for years.

What follows is based on interviews with almost a dozen security experts, including one who is privy to details about the ongoing breach investigation. Because this incident deals with somewhat jargon-laced and esoteric concepts, much of what is described below has been dramatically simplified. Anyone seeking a more technical explanation of the basic concepts referenced here should explore some of the many links included in this story.

According to a source with direct knowledge of the breach investigation, the problem stemmed in part from a misconfigured open-source Web Application Firewall (WAF) that Capital One was using as part of its operations hosted in the cloud with Amazon Web Services (AWS).

Known as “ModSecurity,” this WAF is deployed along with the open-source Apache Web server to provide protections against several classes of vulnerabilities that attackers most commonly use to compromise the security of Web-based applications.

The misconfiguration of the WAF allowed the intruder to trick the firewall into relaying requests to a key back-end resource on the AWS platform. This resource, known as the “metadata” service, is responsible for handing out temporary information to a cloud server, including current credentials sent from a security service to access any resource in the cloud to which that server has access.

In AWS, exactly what those credentials can be used for hinges on the permissions assigned to the resource that is requesting them. In Capital One’s case, the misconfigured WAF for whatever reason was assigned too many permissions, i.e. it was allowed to list all of the files in any buckets of data, and to read the contents of each of those files.

The type of vulnerability exploited by the intruder in the Capital One hack is a well-known method called a “Server Side Request Forgery” (SSRF) attack, in which a server (in this case, CapOne’s WAF) can be tricked into running commands that it should never have been permitted to run, including those that allow it to talk to the metadata service.

Evan Johnson, manager of the product security team at Cloudflare, recently penned an easily digestible column on the Capital One hack and the challenges of detecting and blocking SSRF attacks targeting cloud services. Johnson said it’s worth noting that SSRF attacks are not among the dozen or so attack methods for which detection rules are shipped by default in the WAF exploited as part of the Capital One intrusion.

“SSRF has become the most serious vulnerability facing organizations that use public clouds,” Johnson wrote. “The impact of SSRF is being worsened by the offering of public clouds, and the major players like AWS are not doing anything to fix it. The problem is common and well-known, but hard to prevent and does not have any mitigations built into the AWS platform.”

Johnson said AWS could address this shortcoming by including extra identifying information in any request sent to the metadata service, as Google has already done with its cloud hosting platform. He also acknowledged that doing so could break a lot of backwards compatibility within AWS.

“There’s a lot of specialized knowledge that comes with operating a service within AWS, and to someone without specialized knowledge of AWS, [SSRF attacks are] not something that would show up on any critical configuration guide,” Johnson said in an interview with KrebsOnSecurity.

“You have to learn how EC2 works, understand Amazon’s Identity and Access Management (IAM) system, and how to authenticate with other AWS services,” he continued. “A lot of people using AWS will interface with dozens of AWS services and write software that orchestrates and automates new services, but in the end people really lean into AWS a ton, and with that comes a lot of specialized knowledge that is hard to learn and hard to get right.”

In a statement provided to KrebsOnSecurity, Amazon said it is inaccurate to argue that the Capital One breach was caused by AWS IAM, the instance metadata service, or the AWS WAF in any way.

“The intrusion was caused by a misconfiguration of a web application firewall and not the underlying infrastructure or the location of the infrastructure,” the statement reads. “AWS is constantly delivering services and functionality to anticipate new threats at scale, offering more security capabilities and layers than customers can find anywhere else including within their own datacenters, and when broadly used, properly configured and monitored, offer unmatched security—and the track record for customers over 13+ years in securely using AWS provides unambiguous proof that these layers work.”

Amazon pointed to several (mostly a la carte) services it offers AWS customers to help mitigate many of the threats that were key factors in this breach, including:

Access Advisor, which helps identify and scope down AWS roles that may have more permissions than they need;
GuardDuty, designed to raise alarms when someone is scanning for potentially vulnerable systems or moving unusually large amounts of data to or from unexpected places;
The AWS WAF, which Amazon says can detect common exploitation techniques, including SSRF attacks;
Amazon Macie, designed to automatically discover, classify and protect sensitive data stored in AWS.

William Bengston, formerly a senior security engineer at Netflix, wrote a series of blog posts last year on how Netflix built its own systems for detecting and preventing credential compromises in AWS. Interestingly, Bengston was hired roughly two months ago to be director of cloud security for Capital One. My guess is Capital One now wishes they had somehow managed to lure him away sooner.

Rich Mogull is founder and chief technology officer with DisruptOPS, a firm that helps companies secure their cloud infrastructure. Mogull said one major challenge for companies moving their operations from sprawling, expensive physical data centers to the cloud is that very often the employees responsible for handling that transition are application and software developers who may not be as steeped as they should in security.

“There is a basic skills and knowledge gap that everyone in the industry is fighting to deal with right now,” Mogull said. “For these big companies making that move, they have to learn all this new stuff while maintaining their old stuff. I can get you more secure in the cloud more easily than on-premise at a physical data center, but there’s going to be a transition period as you’re acquiring that new knowledge.”

Image: Capital One

Since news of the Capital One breach broke on Monday, KrebsOnSecurity has received numerous emails and phone calls from security executives who are desperate for more information about how they can avoid falling prey to the missteps that led to this colossal breach (indeed, those requests were part of the impetus behind this story).

Some of those people included executives at big competing banks that haven’t yet taken the plunge into the cloud quite as deeply as Capital One has. But it’s probably not much of a stretch to say they’re all lining up in front of the diving board.

It’s been interesting to watch over the past couple of years how various cloud providers have responded to major outages on their platforms — very often soon after publishing detailed post-mortems on the underlying causes of the outage and what they are doing to prevent such occurrences in the future. In the same vein, it would be wonderful if this kind of public accounting extended to other big companies in the wake of a massive breach.

I’m not holding out much hope that we will get such detail officially from Capital One, which declined to comment on the record and referred me to their statement on the breach and to the Justice Department’s complaint against the hacker. That’s probably to be expected, seeing as the company is already facing a class action lawsuit over the breach and is likely to be targeted by more lawsuits going forward.

But as long as the public and private response to data breaches remains orchestrated primarily by attorneys (which is certainly the case now at most major corporations), everyone else will continue to lack the benefit of being able to learn from and avoid those same mistakes.

from Krebs on Security https://ift.tt/2OA5Uul
via IFTTT