Thursday, January 30, 2025
HomeLinuxNew Version of Privacy and Anonymous Operating System Tails 4.5 Released with...

New Version of Privacy and Anonymous Operating System Tails 4.5 Released with Fix for Security Issues

Published on

SIEM as a Service

Follow Us on Google News

Tails is a security-focused Debian based live operating system, no installation required. You can use the live operating system on any computer from a USB stick or a DVD.

The operating system aimed to provide privacy and anonymity, all its communications are forced through the TOR network.

It leaves no traces on the computer and it uses State-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.

New Version Tails 4.5

The Tails 4.5 was released with a security feature Secure Boot, it is designed to protect the system against malicious code execution in the boot process.

While booting, every time the UEFI firmware inspects the binary for valid signature, invalid binary is loaded while the secure boot is enabled, the user is alerted, and the system will refuse to boot.

The new version of Talis also includes fix for several security bugs, it also includes fix several Firefox vulnerabilities targeted by the attackers in the wild.

Also, the Talis comes with the updated version of Tor Browser 9.0.9, you can also download the Tor browser from the download page.

How to Update?

To update with the latest version, just connect your Tails 4.2 or later to the internet and go for the auto-upgrade process, for some reason if the update fails or using an old version try the manual process.

Here you find the steps to perform the new installation with Windows, macOS & Linux. Also note, all the data with the USB stick will be lost.

You can download Tails 4.5 directly from here For USB sticks & For DVDs and virtual machines.

Talis 4.6 is scheduled to release on May 5, here you can find the complete roadmap.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Lynx Ransomware Architecture to Attack Windows, Linux, ESXi Uncovered

The emergence of the Lynx Ransomware-as-a-Service (RaaS) platform has drawn significant attention in cybersecurity...

Hackers Attacking Windows, macOS, and Linux systems With SparkRAT

Researchers have uncovered new developments in SparkRAT operations, shedding light on its persistent use...

New SCAVY Framework to Detect Memory Corruption Privilege Escalation in Linux Kernel

 A breakthrough framework named SCAVY has been introduced to proactively detect memory corruption targets that could...