|
Source: LinuxSecurity Contributors - Posted by Anthony Pell
|
Thank you for reading the LinuxSecurity.com weekly security newsletter.
The purpose of this document is to provide our readers with a quick
summary of each week's most relevant Linux security headlines.
|
|
|
Source: ZDNet Security - Posted by Dave Wreski
|
With Donald Trump poised to take over the U.S. presidency, does it make sense for all of us to move to encrypted e-mail if we want to preserve our privacy? Encrypted e-mail provider ProtonMail says yes, indeed. |
|
|
Source: ZDNet Security - Posted by Anthony Pell
|
In the coming year, a high-profile auto manufacturer will be forced to recall vehicles due to a cybersecurity breach for the first time, experts have warned.
|
|
|
Source: Wired - Posted by Anthony Pell
|
Public appearances don’t come easily to James Clapper, the United States director of national intelligence. America’s top spy is a 75-year-old self-described geezer who speaks in a low, guttural growl; his physical appearance—muscular and bald—recalls an aging biker who has reluctantly accepted life in a suit. |
|
|
Source: Dark Reading - Posted by Alex
|
White hat hacker Samy Kamkar has come up with a way of to hijack Internet traffics from a password-protected computer.
|
|
|
Source: Wired - Posted by Anthony Pell
|
While we’re still two months away from an actual Trump presidency, tech companies and civil liberties advocates are already grappling with the question of what his ascendency means for privacy and surveillance. Among those weighing in? NSA whistleblower Edward Snowden.
|
|
|
Source: Wired - Posted by Anthony Pell
|
You probably know by now that plugging a random USB into your PC is the digital equivalent of swallowing a pill handed to you by a stranger on the New York subway. But serial hacker Samy Kamkar‘s latest invention may make you think of your computer’s USB ports themselves as unpatchable vulnerabilities—ones that open your network to any hacker who can get momentary access to them, even when your computer is locked. |
|
|
Source: ZDNet Security - Posted by Alex
|
Donald Trump, serial entrepreneur and alleged billionaire, swept to victory as Republican president-elect in Tuesday's election, securing himself as the next US president in charge of domestic policy and foreign affairs, rebuilding the economy, fixing aging infrastructure, and juggling its massive military. |
|
|
Source: ZDNet Security - Posted by Anthony Pell
|
The security hole this time is with how almost all Linux distributions implement Linux Unified Key Setup-on-disk-format (LUKS). LUKS is the standard mechanism for implementing Linux hard disk encryption. LUKS is often put into action with Cryptsetup. It's in Cryptsetup default configuration file that the problem lies and it's a nasty one. |
|
|
Source: CSO Online - Posted by Anthony Pell
|
At a time when the size of distributed denial-of-service attacks has reached unprecedented levels, researchers have found a new attack technique in the wild that allows a single laptop to take down high-bandwidth enterprise firewalls.
|
|
|
Source: LinuxSecurity Contributors - Posted by Anthony Pell
|
Thank you for reading the LinuxSecurity.com weekly security newsletter.
The purpose of this document is to provide our readers with a quick
summary of each week's most relevant Linux security headlines.
|
|
|
Source: arsTechnica - Posted by Dave Wreski
|
OpenSSL on Thursday patched three vulnerabilities in its latest update, and reminded users running version 1.0.1 of the cryptographic library that that security support will end Dec. 31. Of the three bugs, only one was rated high severity and could lead to OpenSSL crashes. Only OpenSSL 1.1.0 is affected, earlier versions are not. Users should upgrade to OpenSSL 1.1.0c.
|
|
|
Source: ZDNet Security - Posted by Alex
|
Many small businesses with tight budgets are facing a tough choice: Stick with obsolete systems and remain vulnerable to hackers, or spend a lot to install new gear. David Gewirtz shows how Linux can help you preserve your investment while staying safe and secure. |
|
|
Source: eSecurityPlanet - Posted by Alex
|
Rootkits are much in the news lately. They were recently sighted in the Street Fighter V video game, critical infrastructure controls and even Yahoo email servers. |
|