LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: January 30th, 2015
Linux Security Week: January 27th, 2015
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Linux Advisory Watch: January 30th, 2015  30 January 2015 
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Advisory Watch Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system.
 
Browse Anonymously with a DIY Raspberry Pi VPN/TOR Router  30 January 2015 
Source: Make - Posted by Dave Wreski   
Privacy Surf the Internet securely with your very own portable WiFi VPN/TOR router. You can configure a Raspberry Pi with Linux and some extra software to connect to a VPN server of your choice. The VPN connection encrypts your internet traffic so that hackers and spies can’t figure out what web sites you are visiting, and the web sites you are visiting can’t tell which computer you are surfing from.
 
A Heroin Dealer Tells the Silk Road Jury What It Was Like to Sell Drugs Online  30 January 2015 
Source: Wired - Posted by Dave Wreski   
Latest News For its two and a half years online, thousands of drug dealers sold every kind of narcotic imaginable on the anonymous online marketplace known as the Silk Road. But put one of the site’s heroin dealers in a courtroom and ask him questions under oath, and the scale and consequences of that drug empire suddenly seem much more real.
 
Dutch judge allows alleged “sophisticated” Russian hacker to be sent to US  29 January 2015 
Source: arsTechnica - Posted by Anthony Pell   
Hacks/Cracks A Dutch judge has ruled that an accused Russian “sophisticated hacker” can be extradited to the United States.
 
This Popular Wireless Alarm System Can Be Hacked With A Magnet And Scotch Tape  29 January 2015 
Source: Forbes - Posted by Dave Wreski   
Hacks/Cracks These new-generation systems can be simple to sophisticated in their ability to detect entry into your home, and much more. Most are now integrating remote monitoring and control of home automation systems, and this was clearly evident at the recent Consumer Electronics Show in Las Vegas, where an incredible array of life-safety and comfort technology was on display.
 
Hackers blackmailed Silk Road underground  29 January 2015 
Source: ZDNet Blogs - Posted by Dave Wreski   
Hacks/Cracks Hackers extorted thousands of dollars out of the Silk Road marketplace through threats of hitting the site with denial of service attacks or exposing severe security vulnerabilities.
 
'Mastermind' hacker steals 20 million credentials from dating website  28 January 2015 
Source: CSO Online - Posted by Anthony Pell   
Hacks/Cracks The user names and email addresses of 20 million visitors to Russian online dating website Topface have reportedly been put up for sale on a crime forum, according to anti-fraud firm Easy Solutions.
 
Is your platform secure? Really?  28 January 2015 
Source: TechWorld - Posted by Anthony Pell   
Security The introduction of the cloud architecture, with its virtualisation basis, has created new avenues of attack. The challenge of protecting the organisational assets and process, while avoiding adverse impact on service levels, is growing.
 
No, Department of Justice, 80 Percent of Tor Traffic Is Not Child Porn  28 January 2015 
Source: Wired - Posted by Dave Wreski   
Government The debate over online anonymity, and all the whistleblowers, trolls, anarchists, journalists and political dissidents it enables, is messy enough. It doesn’t need the US government making up bogus statistics about how much that anonymity facilitates child pornography.
 
GHOST glibc Remote Code Execution Vulnerability Affects All Linux Systems  27 January 2015 
Source: ThreatPost - Posted by Dave Wreski   
Hacks/Cracks A critical vulnerability has been found in glibc, the GNU C library, that affects all Linux systems dating back to 2000. Attackers can use this flaw to execute code and remotely gain control of Linux machines.
 
Why Network Segmentation is Imperative on the Internet of Things  27 January 2015 
Source: Security Ledger - Posted by Alex   
Network Security I’m speaking on a frequent (and increasing) basis with customers about the opportunities and risks that they need to prepare for as they continue to support new business models related to mobility, cloud and the Internet of Things (IoT).
 
No, Lizard Squad Was Not Responsible For Facebook Outage  27 January 2015 
Source: Forbes - Posted by Dave Wreski   
Server Security Contrary to suggestions hacker group Lizard Squad took out Facebook, there was almost certainly no attack on the social network and its photo sharing property Instagram, which both went down late last night. According to a source with knowledge of the matter, the downtime was the result of a technical foul up. Facebook is now confirming this in statements to media.
 
Linux Security Week: January 27th, 2015  26 January 2015 
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Security Week Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.
 
Linux Advisory Watch: January 23rd, 2015  23 January 2015 
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Advisory Watch Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system.
 
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Sponsor:

 

Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.