Categories: Linux

New Version of Privacy and Anonymous Operating System Tails 4.5 Released with Fix for Security Issues

Tails is a security-focused Debian based live operating system, no installation required. You can use the live operating system on any computer from a USB stick or a DVD.

The operating system aimed to provide privacy and anonymity, all its communications are forced through the TOR network.

It leaves no traces on the computer and it uses State-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.

New Version Tails 4.5

The Tails 4.5 was released with a security feature Secure Boot, it is designed to protect the system against malicious code execution in the boot process.

While booting, every time the UEFI firmware inspects the binary for valid signature, invalid binary is loaded while the secure boot is enabled, the user is alerted, and the system will refuse to boot.

The new version of Talis also includes fix for several security bugs, it also includes fix several Firefox vulnerabilities targeted by the attackers in the wild.

Also, the Talis comes with the updated version of Tor Browser 9.0.9, you can also download the Tor browser from the download page.

How to Update?

To update with the latest version, just connect your Tails 4.2 or later to the internet and go for the auto-upgrade process, for some reason if the update fails or using an old version try the manual process.

Here you find the steps to perform the new installation with Windows, macOS & Linux. Also note, all the data with the USB stick will be lost.

You can download Tails 4.5 directly from here For USB sticks & For DVDs and virtual machines.

Talis 4.6 is scheduled to release on May 5, here you can find the complete roadmap.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently detailed…

5 hours ago

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria Stealer,"…

5 hours ago

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton Pass,…

5 hours ago

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly sophisticated…

6 hours ago

Hackers Impersonate Top Tax Firm with 40,000 Phishing Messages to Steal Credentials

Proofpoint researchers have identified a marked increase in phishing campaigns and malicious domain registrations designed…

6 hours ago

Cybercriminals Exploit Public-Facing IIS, Apache, and SQL Servers to Breach Gov & Telecom Systems

A recent investigation by Unit 42 of Palo Alto Networks has uncovered a sophisticated, state-sponsored…

6 hours ago