LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: January 27th, 2015
Linux Advisory Watch: January 23rd, 2015
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Dutch judge allows alleged “sophisticated” Russian hacker to be sent to US  29 January 2015 
Source: arsTechnica - Posted by Anthony Pell   
Hacks/Cracks A Dutch judge has ruled that an accused Russian “sophisticated hacker” can be extradited to the United States.
 
This Popular Wireless Alarm System Can Be Hacked With A Magnet And Scotch Tape  29 January 2015 
Source: Forbes - Posted by Dave Wreski   
Hacks/Cracks These new-generation systems can be simple to sophisticated in their ability to detect entry into your home, and much more. Most are now integrating remote monitoring and control of home automation systems, and this was clearly evident at the recent Consumer Electronics Show in Las Vegas, where an incredible array of life-safety and comfort technology was on display.
 
Hackers blackmailed Silk Road underground  29 January 2015 
Source: ZDNet Blogs - Posted by Dave Wreski   
Hacks/Cracks Hackers extorted thousands of dollars out of the Silk Road marketplace through threats of hitting the site with denial of service attacks or exposing severe security vulnerabilities.
 
'Mastermind' hacker steals 20 million credentials from dating website  28 January 2015 
Source: CSO Online - Posted by Anthony Pell   
Hacks/Cracks The user names and email addresses of 20 million visitors to Russian online dating website Topface have reportedly been put up for sale on a crime forum, according to anti-fraud firm Easy Solutions.
 
Is your platform secure? Really?  28 January 2015 
Source: TechWorld - Posted by Anthony Pell   
Security The introduction of the cloud architecture, with its virtualisation basis, has created new avenues of attack. The challenge of protecting the organisational assets and process, while avoiding adverse impact on service levels, is growing.
 
No, Department of Justice, 80 Percent of Tor Traffic Is Not Child Porn  28 January 2015 
Source: Wired - Posted by Dave Wreski   
Government The debate over online anonymity, and all the whistleblowers, trolls, anarchists, journalists and political dissidents it enables, is messy enough. It doesn’t need the US government making up bogus statistics about how much that anonymity facilitates child pornography.
 
GHOST glibc Remote Code Execution Vulnerability Affects All Linux Systems  27 January 2015 
Source: ThreatPost - Posted by Dave Wreski   
Hacks/Cracks A critical vulnerability has been found in glibc, the GNU C library, that affects all Linux systems dating back to 2000. Attackers can use this flaw to execute code and remotely gain control of Linux machines.
 
Why Network Segmentation is Imperative on the Internet of Things  27 January 2015 
Source: Security Ledger - Posted by Alex   
Network Security I’m speaking on a frequent (and increasing) basis with customers about the opportunities and risks that they need to prepare for as they continue to support new business models related to mobility, cloud and the Internet of Things (IoT).
 
No, Lizard Squad Was Not Responsible For Facebook Outage  27 January 2015 
Source: Forbes - Posted by Dave Wreski   
Server Security Contrary to suggestions hacker group Lizard Squad took out Facebook, there was almost certainly no attack on the social network and its photo sharing property Instagram, which both went down late last night. According to a source with knowledge of the matter, the downtime was the result of a technical foul up. Facebook is now confirming this in statements to media.
 
Linux Security Week: January 27th, 2015  26 January 2015 
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Security Week Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.
 
Linux Advisory Watch: January 23rd, 2015  23 January 2015 
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Advisory Watch Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system.
 
Thousands of U.S. gas stations exposed to Internet attacks  23 January 2015 
Source: Network World - Posted by Dave Wreski   
Hacks/Cracks Over 5,000 devices used by gas stations in the U.S. to monitor their fuel tank levels can be manipulated from the Internet by malicious attackers.
 
Barrett Brown Sentenced to 5 Years in Prison in Connection to Stratfor Hack  23 January 2015 
Source: Wired - Posted by Dave Wreski   
Government Barrett Brown, who became a cause célèbre after he was charged with crimes related to the 2011 Stratfor hack, will not go free as his supporters hoped. He was sentenced today in Texas to five years and three months in prison.
 
Memory Corruption Bugs Found in VLC Media Player  21 January 2015 
Source: ThreatPost - Posted by Dave Wreski   
Vendors/Products There are two memory corruption vulnerabilities in some versions of the VLC open-source media player that can allow an attacker to run arbitrary code on vulnerable machines.
 
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Sponsor:

 

Yesterday's Edition
No, Department of Justice, 80 Percent of Tor Traffic Is Not Child Porn
Is your platform secure? Really?
'Mastermind' hacker steals 20 million credentials from dating website
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.