Friday, February 28, 2025
HomeComputer SecurityPrivacy and Anonymity oriented Live Operating System Tails 3.9 Released

Privacy and Anonymity oriented Live Operating System Tails 3.9 Released

Published on

SIEM as a Service

Follow Us on Google News

Tails is a live operating system aims at privacy and anonymity, you can use the live operating system on any computer from a USB stick or a DVD.

Talis version 3.9

The release fixed number of security issues and contains two new additional features.

Additional Software

Tails 3.9 enables you to install additional software automatically when starting Talis, you can also select the application needs to be installed only one time or every time when system start’sup.

Applications â–¸ System Tool â–¸ Additional Software.

Veracypt Integration

Now you can unlock VeraCrypt volume in Tails

Applications â–¸ System Tool â–¸ Unlock VeraCrypt Volumes.

Important Upgrades

Improved configuration of the persistent storage.
Tor Browser 8.0
Thunderbird version 60
Tor 0.3.4.7-RC
Electrum 3.1.3.
Linux to 4.17 which fixes the Foreshadow attack.
Intel and AMD microcode firmware to address Spectre and Meltdown.

How to get Tails 3.9

Automatic upgrades Available from 3.7.1, 3.8, and 3.9~rc1 to 3.9.

If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a manual upgrade.

Download Tails 3.9.

Also Read

Tor Browser for Android – Browse Anonymously on Android Devices

Share Your Files Anonymously Using TOR and Onion Share

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Winos4.0 Malware Targets Windows Users Through Malicious PDF Files

A new wave of cyberattacks leveraging the Winos4.0 malware framework has targeted organizations in...

DeepSeek Data Leak Exposes 12,000 Hardcoded API Keys and Passwords

A sweeping analysis of the Common Crawl dataset—a cornerstone of training data for large...

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...

New FUD Malware Targets MacOS, Evading Antivirus and Security Tools

A new strain of Fully Undetectable (FUD) macOS malware, dubbed "Tiny FUD," has emerged,...