LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: July 18th, 2014
Linux Advisory Watch: July 13th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
How Hackers Hid a Money-Mining Botnet in Amazon’s Cloud  24 July 2014 
Source: Wired - Posted by Dave Wreski   
Intrusion Detection Hackers have long used malware to enslave armies of unwitting PCs, but security researchers Rob Ragan and Oscar Salazar had a different thought: Why steal computing power from innocent victims when there’s so much free processing power out there for the taking?
 
Black Hat presentation on TOR suddenly cancelled  23 July 2014 
Source: CSO Online - Posted by Dave Wreski   
A presentation on a low-budget method to unmask users of a popular online privacy tool, TOR, will no longer go ahead at the Black Hat security conference early next month.
 
A Convicted Hacker and an Internet Icon Join Forces to Thwart NSA Spying  23 July 2014 
Source: Wired - Posted by Dave Wreski   
Server Security The internet is littered with burgeoning email encryption schemes aimed at thwarting NSA spying. Many of them are focused on solving the usability issues that have plagued complicated encryption schemes like PGP for years. But a new project called Dark Mail plans to go further: to hide your metadata.
 
Attackers raid SWISS BANKS with DNS and malware bombs  23 July 2014 
Source: The Register UK - Posted by Dave Wreski   
Network Security Attackers suspected of residing in Russia are raiding Swiss bank accounts with a multi-faceted attack that intercepts SMS tokens and changes domain name system settings, researchers have warned.
 
Anti-surveillance advocates want you to run an open, secure WiFi router  23 July 2014 
Source: Engadget - Posted by Alex   
Wireless Security Plenty of WiFi routers have guest modes for visitors; some companies base their entire business models around them. Many of these devices are full of security holes, however, and the Electronic Frontier Foundation doesn't see that as acceptable in an era where widespread government surveillance is a fact of life.
 
Hackers Could Take Control of Your Car. This Device Can Stop Them  22 July 2014 
Source: Wired - Posted by Dave Wreski   
Hacks/Cracks Hackers Charlie Miller and Chris Valasek have proven more clearly than anyone in the world how vulnerable cars are to digital attack. Now they’re proposing the first step towards a solution.
 
EFF wants hackers to help build an open, secure router  22 July 2014 
Source: The Inquirer - Posted by Dave Wreski   
Server Security DIGITAL RIGHTS GROUP the Electronic Frontier Foundation (EFF) is asking hackers to help it with its plans to build a secure but open router.
 
Router hacking competition announced for Defcon  22 July 2014 
Source: IT News AU - Posted by Dave Wreski   
Intrusion Detection Well-known manufacturers of residential and SME wireless routers will have reason to feel nervous as hackers at the annual DefCon security conference aim to break into their products to find undocumented vulnerabilities or so-called zero days.
 
Edward Snowden Calls on Hackers to Help Whistleblowers Leak More Secrets  21 July 2014 
Source: Mashable - Posted by Dave Wreski   
Privacy Edward Snowden made an impassioned call on Saturday for hackers and technologists to help would-be whistleblowers spill more government secrets.
 
Home router security holes to be exposed at Def Con 22 hacker meet up  21 July 2014 
Source: recombu - Posted by Dave Wreski   
How secure is your wireless router? The Def Con 22 hacker conference aims to find out exactly how resilient off the shelf products are next month during a six-day hackathon.
 
Linux Advisory Watch: July 18th, 2014  18 July 2014 
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Advisory Watch Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system.
 
Google recruits top PS3 hacker for Project Zero  17 July 2014 
Source: ZDNet Blogs - Posted by Anthony Pell   
Latest News Google has hired a prolific hacker by the name of George Hotz to join the Project Zero team. Hotz is well-known for hacking Sony's PlayStation 3 and Apple's iPhone. The 24-year-old — also known as geohot — hacked into the PlayStation 3 in order to install alternate operating system software, with the intention of playing pirated games.
 
Content Security Policy Mitigates XSS, Breaks Websites  17 July 2014 
Source: ThreatPost - Posted by Alex   
Intrusion Detection Content Security Policy (CSP) is an effective, browser-based deterrent against cross-site scripting attacks. Despite this, the vast majority of websites do not deploy the standard, and the majority of those that do, deploy it improperly.
 
Here’s How Easy It Could Be for Hackers to Control Your Hotel Room  17 July 2014 
Source: Wired - Posted by Dave Wreski   
Hacks/Cracks Shenzhen is the Silicon Valley of mainland China. Situated about 50 minutes north of Hong Kong, the modern city is home to the Shenzhen Stock Exchange and numerous high-tech giants and startups.
 
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Sponsor:

 

Yesterday's Edition
Anti-surveillance advocates want you to run an open, secure WiFi router
Attackers raid SWISS BANKS with DNS and malware bombs
A Convicted Hacker and an Internet Icon Join Forces to Thwart NSA Spying
Black Hat presentation on TOR suddenly cancelled
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.