LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: March 9th, 2015
Linux Advisory Watch: March 6th, 2015
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Cutting-edge hack gives super user status by exploiting DRAM weakness  10 March 2015 
Source: arsTechnica - Posted by Dave Wreski   
Security Projects In one of more impressive hacks in recent memory, researchers have devised an attack that exploits physical weaknesses in certain types of DDR memory chips to elevate the system rights of untrusted users of Intel-compatible PCs running Linux.
 
UK Gov SciTech advice bureau suggests keeping Tor alive to reduce street crime  10 March 2015 
Source: The Register UK - Posted by Alex   
Government The UK Parliamentary Office of Science and Technology (POST) has issued a POSTnote titled “The darknet and online anonymity” in which it assesses the threats posed by anonymity technologies like Tor and concludes there's not much governments or law enforcement agencies can do about them.
 
Wikimedia sues NSA to stop it from spying on its users  10 March 2015 
Source: Network World - Posted by Anthony Pell   
Privacy In an effort to stop the U.S. government from spying on Wikipedia’s readers and editors, the Wikimedia Foundation will sue the U.S. National Security Agency (NSA) and the Department of Justice (DOJ).
 
Dridex Banking Trojan Spreading Via Macros in XML Files  10 March 2015 
Source: ThreatPost - Posted by Dave Wreski   
Hacks/Cracks Not long ago, criminals pushing the Dridex banking Trojan were using Microsoft Excel documents spiked with a malicious macro as a phishing lure to entice victims to load the malware onto their machines.
 
Linux Security Week: March 9th, 2015  09 March 2015 
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Security Week Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.
 
IoT's dark side: Hundreds of unsecured devices open to attack  09 March 2015 
Source: CSO Online - Posted by Alex   
Hacks/Cracks A self-described security "amateur" discovered hundreds of Internet-connected devices ranging from cameras to industrial control systems that were connected to the Internet without even basic password protection -- meaning they could be easily turned on and off or otherwise manipulated with a single click of a mouse.
 
Cryptocurrency software bundled with BitTorrent triggers complaints  09 March 2015 
Source: Network World - Posted by Dave Wreski   
Intrusion Detection Some people who use uTorrent, the popular BitTorrent client, are up in arms over the presence of cryptocurrency mining software on their computers which they say was installed without their permission.
 
Clinton's Homebrew E-Mail Server: Risky or Genius?  09 March 2015 
Source: Top Tech News - Posted by Dave Wreski   
Server Security No, it's not always a room filled with wires and glowing blue lights. It's probably not even the size of your furnace. The personal email server used by Hillary Rodham Clinton during her time as secretary of state was probably about the size of your office desktop computer and could have been tucked quietly in a corner somewhere.
 
Linux Advisory Watch: March 6th, 2015  06 March 2015 
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Advisory Watch Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system.
 
Domain keywords used to spot phishing sites  06 March 2015 
Source: CSO Online - Posted by Dave Wreski   
Network Security Criminals setting up fake domains for phishing are prone to use the same words over and over and spotting those words can help identify malicious sites, according to a new threat detection model from OpenDNS.
 
EFF, ACLU, Other NGOs Urging U.N. to Create Privacy Watchdog  06 March 2015 
Source: ThreatPost - Posted by Dave Wreski   
Privacy A coalition of 63 non-governmental organizations (NGOs) from around the world are calling on national governments to support the establishment of a special rapporteur on the right to privacy within the United Nations.
 
PATCH FREAK NOW: Cloud providers faulted for slow response  05 March 2015 
Source: The Register UK - Posted by Dave Wreski   
Intrusion Detection Hundreds of cloud providers are still vulnerable to the serious FREAK cryptographic vulnerability. Skyhigh Networks found that 766 cloud services are still at risk 24 hours after FREAK was made public, based on an analysis of more than 10,000 different services.
 
CSI: Cyber: We Watched So You Didn’t Have To  05 March 2015 
Source: ThreatPost - Posted by Dave Wreski   
Latest News From the time the first commercials aired during the American pro football championship game last month, CSI: Cyber has been one of the more talked-about and least-anticipated shows in recent memory. At least in tech circles. For normal viewers, it’s one of those shows that you wake up in the middle of at 10:27 after nodding off during Criminal Minds or CSI: Pet Detectives.
 
Snowden willing to face trial in US, if it's fair  04 March 2015 
Source: Network World - Posted by Anthony Pell   
Latest News Edward Snowden, the former U.S. National Security Agency contractor who leaked details of the agency’s surveillance programs, is willing to return to the U.S. and face criminal charges, if he’s assured of a fair trial, according to a Russian news report.
 
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Sponsor:

 

Yesterday's Edition
Dridex Banking Trojan Spreading Via Macros in XML Files
Wikimedia sues NSA to stop it from spying on its users
UK Gov SciTech advice bureau suggests keeping Tor alive to reduce street crime
Cutting-edge hack gives super user status by exploiting DRAM weakness
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.