Tuesday, February 11, 2025
HomeLinuxNew Version of Privacy and Anonymous Operating System Tails 4.5 Released with...

New Version of Privacy and Anonymous Operating System Tails 4.5 Released with Fix for Security Issues

Published on

SIEM as a Service

Follow Us on Google News

Tails is a security-focused Debian based live operating system, no installation required. You can use the live operating system on any computer from a USB stick or a DVD.

The operating system aimed to provide privacy and anonymity, all its communications are forced through the TOR network.

It leaves no traces on the computer and it uses State-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.

New Version Tails 4.5

The Tails 4.5 was released with a security feature Secure Boot, it is designed to protect the system against malicious code execution in the boot process.

While booting, every time the UEFI firmware inspects the binary for valid signature, invalid binary is loaded while the secure boot is enabled, the user is alerted, and the system will refuse to boot.

The new version of Talis also includes fix for several security bugs, it also includes fix several Firefox vulnerabilities targeted by the attackers in the wild.

Also, the Talis comes with the updated version of Tor Browser 9.0.9, you can also download the Tor browser from the download page.

How to Update?

To update with the latest version, just connect your Tails 4.2 or later to the internet and go for the auto-upgrade process, for some reason if the update fails or using an old version try the manual process.

Here you find the steps to perform the new installation with Windows, macOS & Linux. Also note, all the data with the USB stick will be lost.

You can download Tails 4.5 directly from here For USB sticks & For DVDs and virtual machines.

Talis 4.6 is scheduled to release on May 5, here you can find the complete roadmap.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Apple iOS 0-day Vulnerability Exploited Wild in Extremely Sophisticated Attack

Apple has released emergency security updates to address a zero-day vulnerability, CVE-2025-24200, that has...

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity...

New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2

A recent analysis of over one million malware samples by Picus Security has revealed...

Seven-Year-Old Linux Kernel Bug Opens Door to Remote Code Execution

Researchers have uncovered a critical vulnerability in the Linux kernel, dating back seven years,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Seven-Year-Old Linux Kernel Bug Opens Door to Remote Code Execution

Researchers have uncovered a critical vulnerability in the Linux kernel, dating back seven years,...

Linux Kernel 6.14-rc2 Released – What’s Newly Added !

Linus Torvalds, lead developer of the Linux kernel, announced the second release candidate (rc2)...

Ubuntu Officially Available on the Updated Windows Subsystem for Linux

Ubuntu has announced its availability on Microsoft’s new tar-based Windows Subsystem for Linux (WSL)...