LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: January 27th, 2015
Linux Advisory Watch: January 23rd, 2015
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
'Mastermind' hacker steals 20 million credentials from dating website  28 January 2015 
Source: CSO Online - Posted by Anthony Pell   
Hacks/Cracks The user names and email addresses of 20 million visitors to Russian online dating website Topface have reportedly been put up for sale on a crime forum, according to anti-fraud firm Easy Solutions.
 
Is your platform secure? Really?  28 January 2015 
Source: TechWorld - Posted by Anthony Pell   
Security The introduction of the cloud architecture, with its virtualisation basis, has created new avenues of attack. The challenge of protecting the organisational assets and process, while avoiding adverse impact on service levels, is growing.
 
No, Department of Justice, 80 Percent of Tor Traffic Is Not Child Porn  28 January 2015 
Source: Wired - Posted by Dave Wreski   
Government The debate over online anonymity, and all the whistleblowers, trolls, anarchists, journalists and political dissidents it enables, is messy enough. It doesn’t need the US government making up bogus statistics about how much that anonymity facilitates child pornography.
 
GHOST glibc Remote Code Execution Vulnerability Affects All Linux Systems  27 January 2015 
Source: ThreatPost - Posted by Dave Wreski   
Hacks/Cracks A critical vulnerability has been found in glibc, the GNU C library, that affects all Linux systems dating back to 2000. Attackers can use this flaw to execute code and remotely gain control of Linux machines.
 
Why Network Segmentation is Imperative on the Internet of Things  27 January 2015 
Source: Security Ledger - Posted by Alex   
Network Security I’m speaking on a frequent (and increasing) basis with customers about the opportunities and risks that they need to prepare for as they continue to support new business models related to mobility, cloud and the Internet of Things (IoT).
 
No, Lizard Squad Was Not Responsible For Facebook Outage  27 January 2015 
Source: Forbes - Posted by Dave Wreski   
Server Security Contrary to suggestions hacker group Lizard Squad took out Facebook, there was almost certainly no attack on the social network and its photo sharing property Instagram, which both went down late last night. According to a source with knowledge of the matter, the downtime was the result of a technical foul up. Facebook is now confirming this in statements to media.
 
Linux Security Week: January 27th, 2015  26 January 2015 
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Security Week Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.
 
Linux Advisory Watch: January 23rd, 2015  23 January 2015 
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Advisory Watch Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system.
 
Thousands of U.S. gas stations exposed to Internet attacks  23 January 2015 
Source: Network World - Posted by Dave Wreski   
Hacks/Cracks Over 5,000 devices used by gas stations in the U.S. to monitor their fuel tank levels can be manipulated from the Internet by malicious attackers.
 
Barrett Brown Sentenced to 5 Years in Prison in Connection to Stratfor Hack  23 January 2015 
Source: Wired - Posted by Dave Wreski   
Government Barrett Brown, who became a cause célèbre after he was charged with crimes related to the 2011 Stratfor hack, will not go free as his supporters hoped. He was sentenced today in Texas to five years and three months in prison.
 
Memory Corruption Bugs Found in VLC Media Player  21 January 2015 
Source: ThreatPost - Posted by Dave Wreski   
Vendors/Products There are two memory corruption vulnerabilities in some versions of the VLC open-source media player that can allow an attacker to run arbitrary code on vulnerable machines.
 
Wireless device in two million cars wide open to hacking  21 January 2015 
Source: arsTechnica - Posted by Anthony Pell   
Hacks/Cracks An electronic dongle used to connect to the onboard diagnostic systems of more than two million cars and trucks contains few defenses against hacking, an omission that makes them vulnerable to wireless attacks that take control of a vehicle, according to published reports.
 
Backdoor in a Public RSA Key  21 January 2015 
Source: kukuruku.co - Posted by Dave Wreski   
Cryptography Hello, %username%! When I saw how it works, say that I was shocked is to say nothing. It's a pretty simple trick, but after reading this article, you will never look at the RSA as before. This is not a way to hijack RSA, but something that will make your paranoia greatly swell.
 
Why I Hope Congress Never Watches Blackhat  20 January 2015 
Source: Wired - Posted by Dave Wreski   
Government What a strange time. Last week I was literally walking the red carpet at the Hollywood premiere of Michael Mann’s Blackhat, a crime thriller that I had the good fortune to work on as a “hacker adviser” (my actual screen credit). Today, all I’m thinking is, please, God, don’t let anybody in Congress see the film.
 
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Sponsor:

 

Yesterday's Edition
No, Lizard Squad Was Not Responsible For Facebook Outage
Why Network Segmentation is Imperative on the Internet of Things
GHOST glibc Remote Code Execution Vulnerability Affects All Linux Systems
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.