LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: July 18th, 2014
Linux Advisory Watch: July 13th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Edward Snowden Calls on Hackers to Help Whistleblowers Leak More Secrets  21 July 2014 
Source: Mashable - Posted by Dave Wreski   
Privacy Edward Snowden made an impassioned call on Saturday for hackers and technologists to help would-be whistleblowers spill more government secrets.
 
Home router security holes to be exposed at Def Con 22 hacker meet up  21 July 2014 
Source: recombu - Posted by Dave Wreski   
How secure is your wireless router? The Def Con 22 hacker conference aims to find out exactly how resilient off the shelf products are next month during a six-day hackathon.
 
Linux Advisory Watch: July 18th, 2014  18 July 2014 
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Advisory Watch Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system.
 
Google recruits top PS3 hacker for Project Zero  17 July 2014 
Source: ZDNet Blogs - Posted by Anthony Pell   
Latest News Google has hired a prolific hacker by the name of George Hotz to join the Project Zero team. Hotz is well-known for hacking Sony's PlayStation 3 and Apple's iPhone. The 24-year-old — also known as geohot — hacked into the PlayStation 3 in order to install alternate operating system software, with the intention of playing pirated games.
 
Content Security Policy Mitigates XSS, Breaks Websites  17 July 2014 
Source: ThreatPost - Posted by Alex   
Intrusion Detection Content Security Policy (CSP) is an effective, browser-based deterrent against cross-site scripting attacks. Despite this, the vast majority of websites do not deploy the standard, and the majority of those that do, deploy it improperly.
 
Here’s How Easy It Could Be for Hackers to Control Your Hotel Room  17 July 2014 
Source: Wired - Posted by Dave Wreski   
Hacks/Cracks Shenzhen is the Silicon Valley of mainland China. Situated about 50 minutes north of Hong Kong, the modern city is home to the Shenzhen Stock Exchange and numerous high-tech giants and startups.
 
EFF lies about NetNeutrality  16 July 2014 
Source: Errata Security - Posted by Dave Wreski   
Latest News This tweet is lie. Congress can't "kill Net Neutrality" because Net Neutrality doesn't currently exist. Net Neutrality proponents don't want to maintain the status quo, but radically change the Internet, converting it from the private network it is now into a public utility, regulated by the government.
 
CNET attacked by Russian hacker group  15 July 2014 
Source: CNET - Posted by Dave Wreski   
Hacks/Cracks A Russian hacker group that has attacked some of the biggest news and business sites in the world claims it penetrated CNET's website over the weekend and stole a database of registered reader data.
 
Russia demands United States releases accused hacker immediately  15 July 2014 
Source: The Star MY - Posted by Dave Wreski   
Latest News The Russian Foreign Ministry said on Tuesday it had issued an official protest to the United States demanding immediate release of a Russian citizen detained last week on hacking charges.
 
Cryptolocker neutralized, says Justice Department  15 July 2014 
Source: SC Magazine - Posted by Alex   
Cryptography A status report filed by the Justice Department on Friday indicates that the Cryptolocker threat has been neutralized. Cryptolocker, ransomware that extorted more than $27 million from its victims in nine months of existence, can no longer communicate with the infrastructure used to control the malware, according to a Friday release.
 
Too many cooks may worsen the OpenSSL mess  14 July 2014 
Source: InfoWorld - Posted by Anthony Pell   
Cryptography Nobody questions that OpenSSL is a vital part of the Internet's infrastructure. So many fundamentals are built on top of it and in so many places. Too much is at stake for it to be vulnerable to yet another Heartbleed, the dangers of which may linger for some time in embedded and client devices.
 
Popular password protection programs p0wnable  14 July 2014 
Source: The Register UK - Posted by Alex   
Hacks/Cracks Researchers have detailed a series of quickly patched vulnerabilities in five popular password managers that could allow attackers to steal user credentials. "Critical" vulnerabilities were discovered and reported in LastPass, RoboForm, My1Login, PasswordBox and NeedMyPassword in work described by the University of California Berkeley researchers as a "wake-up call" for developers of web password vaults.
 
5 reasons why software bugs still plague us  14 July 2014 
Source: InfoWorld - Posted by Dave Wreski   
Security Projects Another month, another few dozen patches to install -- it's never-ending. It's frustrating. Software coding tools supposedly have security built in by default. We have "safe" programming languages. We have programmers using SDL (security development lifecycle) coding tools and techniques.
 
Bug Lab Hackers sell Facebook Privacy Vulnerability  14 July 2014 
Source: Cyber War Zone - Posted by Dave Wreski   
Hacks/Cracks The Bug Lab hacking group which can be found on 1337day.com, is selling a Facebook Privacy Vulnerability which allows the hacker to send messages via any Facebook account.
 
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Sponsor:

 

Yesterday's Edition
Home router security holes to be exposed at Def Con 22 hacker meet up
Edward Snowden Calls on Hackers to Help Whistleblowers Leak More Secrets
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.