Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: July 28th, 2014
Linux Advisory Watch: July 25th, 2014
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

NSA keeps low profile at hacker conventions despite past appearances  31 July 2014 
Source: The Guardian UK - Posted by Dave Wreski   
As hackers prepare to gather in Las Vegas for a pair of annual conventions, the leadership of the National Security Agency won’t make the trek.
Is there Another NSA Leaker? Updated  30 July 2014 
Source: Salon - Posted by Dave Wreski   
Privacy This morning a partial analysis of the NSA’s XKEYSCORE code was published in Germany. Jacob Applebaum, an evangelist for the The Onion Project (TOR), was one of the authors. The report details specific rules written for one of the NSA’s data collection tools, XKEYSCORE, which collects the IP addresses of TOR bridges, and users of the TOR network.
More Details of Onion/Critroni Crypto Ransomware Emerge  30 July 2014 
Source: ThreatPost - Posted by Anthony Pell   
Intrusion Detection More details about a new family of encryption ransomware that uses the anonymous network Tor and requires users pay by Bitcoin have emerged.
NSA Playset, 911 hacked and war cats: A wild ride at DEF CON 22  30 July 2014 
Source: ZDNet Blogs - Posted by Anthony Pell   
Next week America's biggest hacker conference starts its yearly reign of controversy, and we've got a hotlist of DEF CON 22's most incendiary talks. DEF CON returns to Las Vegas at the ripe age of 22 with four packed days of talks, expo, 303 Skytalks, panels, lockpicking, Queercon, social engineering sport, the Tamper Evident Village, Defcon Kids, and much more from August 7-10 at the Rio Hotel and Casino.
Black Hat 2014: How to crack just about everything  30 July 2014 
Source: CSO Online - Posted by Dave Wreski   
As the world’s best security experts prepare to descend on Black Hat USA 2014 next month, they must be rubbing their hands in anticipation of colleague’s upcoming revelations about the latest means to crack a range of devices and flaws they’ve found in trusted protocols.
Ottawa Linux Symposium: May get by with a little help from its friends  30 July 2014 
Source: Linux Magazine - Posted by Dave Wreski   
I do not often do this, but old friend is in trouble. Please stay with me as I tell this story. It was around the year 2002, and I was in Brazil. I met two young college students who were very interested in Linux, and who impressed me with their enthusiasm and willingness to help others.
Insecure Connections: Enterprises hacked after neglecting third-party risks  29 July 2014 
Source: CSO Online - Posted by Dave Wreski   
Hacks/Cracks It is said that an enterprise is only as secure as its weakest link. Today, that weak link often turns out to be partners, suppliers, and others with persistent network and application access.
Boffins build FREE SUPERCOMPUTER from free cloud server trials  29 July 2014 
Source: The Register UK - Posted by Dave Wreski   
Network Security Researchers Rob Ragan and Oscar Salazar have built a free LiteCoin-mining botnet that generates $US1750 a week using free cloud signup promotions.
Internet of things big security worry, says HP  29 July 2014 
Source: ZDNet Blogs - Posted by Dave Wreski   
Intrusion Detection About 70 percent of Internet of things devices---including sensors and connected infrastructure---have vulnerabilities that could be exploited, according to Hewlett-Packard.
Hackers Plundered Israeli Defense Firms that Built ‘Iron Dome’ Missile Defense System  29 July 2014 
Source: Krebs on Security - Posted by Dave Wreski   
Hacks/Cracks Three Israeli defense contractors responsible for building the “Iron Dome” missile shield currently protecting Israel from a barrage of rocket attacks were compromised by hackers and robbed of huge quantities of sensitive documents pertaining to the shield technology, KrebsOnSecurity has learned.
Linux Security Week: July 28th, 2014  28 July 2014 
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Security Week Thank you for reading the weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.
Hackers seed Amazon cloud with potent denial-of-service bots  28 July 2014 
Source: arsTechnica - Posted by Dave Wreski   
Intrusion Detection Attackers have figured out a new way to get Amazon's cloud service to wage potent denial-of-service attacks on third-party websites—by exploiting security vulnerabilities in an open source search and analytics application known as Elasticsearch.
Hacker Gary McKinnon turns into a search expert  28 July 2014 
Source: BBC - Posted by Dave Wreski   
Latest News Gary McKinnon, the computer hacker who was the subject of a 10-year legal battle over US extradition, has reinvented himself as a search expert. Mr McKinnon launched Small SEO, a site where he charges £40 an hour to help businesses get mentioned in search results.
DARPA-derived secure microkernel goes open source tomorrow  28 July 2014 
Source: The Register UK - Posted by Dave Wreski   
Security Projects A nippy microkernel mathematically proven to be bug free*, and used to protect drones from hacking, will be released as open source tomorrow.


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition


Yesterday's Edition
NSA keeps low profile at hacker conventions despite past appearances
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.