Must Read Articles

Looking to improve your knowledge of Linux security, but unsure where to start? LinuxSecurity Must-Read articles provide valuable info on critical topics that impact the security of your Linux system.

Best Secure Linux Distros for Enhanced Privacy & Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As we transition to an increasingly digital society, privacy and security, have become areas of central concern – not a day goes by that we aren’t bombarded with security news headlines about hacks, breaches, and the increasingly common and worrisome practice of storing and monitoring sensitive personal information, often without users’ consent.

191 Brittany Brittany Day

The Truth About Linux Malware & How to Protect Your System

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If you’ve been keeping up with the latest IT security news, you may have noticed the increase in the number of attacks on network security within Linux systems. Cloud Snooper, EvilGnome, HiddenWasp, QNAPCrypt, GonnaCry, FBOT, and Tycoon have become prime malware variants to be aware of when working.

191 Brittany Brittany Day

How Secure Is Linux?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Choosing the safest operating system (OS) is a key determinant of your online security. After all, this software manages the memory and processes throughout your server. Experts agree that Linux is a highly secure OS, if not the best security OS designed. In this article, we will examine the key Linux security features that contribute to this system's being a secure OS. Additionally, we will evaluate the protection capabilities Linux features offer to administrators and users and how they combat cyber security vulnerabilities and attacks in network security.

191 Brittany Brittany Day

Top Tips for Securing Your Linux System

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Linux servers are at greater risk than ever. While only a few years ago Linux users could count themselves as the “lucky few” who didn’t have to worry about malware and computer viruses, this era has unfortunately come to an end.

191 Brittany Brittany Day

Anatomy of a Linux Ransomware Attack

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Ransomware has dominated cybersecurity news headlines for the past decade, and for good reason. Through a combination of advanced encryption and effective extortion mechanisms, a ransomware attack can have devastating consequences for any victim including data loss, reputation harm, recovery costs and significant downtime.

191 Brittany Brittany Day

Must Read Articles