LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: November 21st, 2016
Linux Security Week: November 14th, 2016
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Linux Security Week: November 21st, 2016  21 November 2016 
Source: LinuxSecurity Contributors - Posted by Anthony Pell   
Linux Security Week Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.
 
Is encrypted e-mail a must in the Trump presidential era?  21 November 2016 
Source: ZDNet Security - Posted by Dave Wreski   
Privacy With Donald Trump poised to take over the U.S. presidency, does it make sense for all of us to move to encrypted e-mail if we want to preserve our privacy? Encrypted e-mail provider ProtonMail says yes, indeed.
 
Your car will be recalled in 2017 thanks to poor open-source security  21 November 2016 
Source: ZDNet Security - Posted by Anthony Pell   
Hacks/Cracks In the coming year, a high-profile auto manufacturer will be forced to recall vehicles due to a cybersecurity breach for the first time, experts have warned.
 
America’s Top Spy Talks Snowden Leaks and Our Ominous Future  17 November 2016 
Source: Wired - Posted by Anthony Pell   
Government Public appearances don’t come easily to James Clapper, the United States director of national intelligence. America’s top spy is a 75-year-old self-described geezer who speaks in a low, guttural growl; his physical appearance—muscular and bald—recalls an aging biker who has reluctantly accepted life in a suit.
 
How To 'PoisonTap' A Locked Computer Using A $5 Raspberry Pi  17 November 2016 
Source: Dark Reading - Posted by Alex   
Security Projects White hat hacker Samy Kamkar has come up with a way of to hijack Internet traffics from a password-protected computer.
 
Despite Trump Fears, Snowden Sees a Hopeful Future  16 November 2016 
Source: Wired - Posted by Anthony Pell   
Privacy While we’re still two months away from an actual Trump presidency, tech companies and civil liberties advocates are already grappling with the question of what his ascendency means for privacy and surveillance. Among those weighing in? NSA whistleblower Edward Snowden.
 
Wickedly Clever USB Stick Installs a Backdoor on Locked PCs  16 November 2016 
Source: Wired - Posted by Anthony Pell   
Hacks/Cracks You probably know by now that plugging a random USB into your PC is the digital equivalent of swallowing a pill handed to you by a stranger on the New York subway. But serial hacker Samy Kamkar‘s latest invention may make you think of your computer’s USB ports themselves as unpatchable vulnerabilities—ones that open your network to any hacker who can get momentary access to them, even when your computer is locked.
 
In case of cyberattack, don't count on Donald Trump knowing what to do  15 November 2016 
Source: ZDNet Security - Posted by Alex   
Government Donald Trump, serial entrepreneur and alleged billionaire, swept to victory as Republican president-elect in Tuesday's election, securing himself as the next US president in charge of domestic policy and foreign affairs, rebuilding the economy, fixing aging infrastructure, and juggling its massive military.
 
Major Linux security hole gapes open  15 November 2016 
Source: ZDNet Security - Posted by Anthony Pell   
Cryptography The security hole this time is with how almost all Linux distributions implement Linux Unified Key Setup-on-disk-format (LUKS). LUKS is the standard mechanism for implementing Linux hard disk encryption. LUKS is often put into action with Cryptsetup. It's in Cryptsetup default configuration file that the problem lies and it's a nasty one.
 
DoS technique lets a single laptop take down an enterprise firewall  15 November 2016 
Source: CSO Online - Posted by Anthony Pell   
Firewalls At a time when the size of distributed denial-of-service attacks has reached unprecedented levels, researchers have found a new attack technique in the wild that allows a single laptop to take down high-bandwidth enterprise firewalls.
 
Linux Security Week: November 14th, 2016  14 November 2016 
Source: LinuxSecurity Contributors - Posted by Anthony Pell   
Linux Security Week Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.
 
OpenSSL Patches High-Severity Denial-of-Service Bug  14 November 2016 
Source: arsTechnica - Posted by Dave Wreski   
Cryptography OpenSSL on Thursday patched three vulnerabilities in its latest update, and reminded users running version 1.0.1 of the cryptographic library that that security support will end Dec. 31. Of the three bugs, only one was rated high severity and could lead to OpenSSL crashes. Only OpenSSL 1.1.0 is affected, earlier versions are not. Users should upgrade to OpenSSL 1.1.0c.
 
How Linux can save small businesses (and old hardware)  14 November 2016 
Source: ZDNet Security - Posted by Alex   
Host Security Many small businesses with tight budgets are facing a tough choice: Stick with obsolete systems and remain vulnerable to hackers, or spend a lot to install new gear. David Gewirtz shows how Linux can help you preserve your investment while staying safe and secure.
 
Top 5 Rootkit Threats and How to Root Them out  14 November 2016 
Source: eSecurityPlanet - Posted by Alex   
Hacks/Cracks Rootkits are much in the news lately. They were recently sighted in the Street Fighter V video game, critical infrastructure controls and even Yahoo email servers.
 
    
Partner

 

Latest Features
Social Engineering Methods for Penetration Testing
Putting Infosec Principles into Practice
Installing an Apache Web Server with TLS
Essential tools for hardening and securing Unix based Environments
Securing a Linux Web Server
Peter Smith Releases Linux Network Security Online
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Sponsor:

 

Yesterday's Edition
Your car will be recalled in 2017 thanks to poor open-source security
Is encrypted e-mail a must in the Trump presidential era?
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2016 Guardian Digital, Inc. All rights reserved.