This week, perhaps the most interesting articles include "," "," and "Tool Turns Any JavaScript-Enabled Browser into a Malicious Drone."


Earn an NSA recognized IA Masters Online - The NSA has designated Norwich University a center of Academic Excellence in Information Security. Our program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Using interactive e-Learning technology, you can earn this esteemed degree, without disrupting your career or home life.


LinuxSecurity.com Feature Extras:

RFID with Bio-Smart Card in Linux - In this paper, we describe the integration of fingerprint template and RF smart card for clustered network, which is designed on Linux platform and Open source technology to obtain biometrics security. Combination of smart card and biometrics has achieved in two step authentication where smart card authentication is based on a Personal Identification Number (PIN) and the card holder is authenticated using the biometrics template stored in the smart card that is based on the fingerprint verification. The fingerprint verification has to be executed on central host server for security purposes. Protocol designed allows controlling entire parameters of smart security controller like PIN options, Reader delay, real-time clock, alarm option and cardholder access conditions.

pgp Key Signing Observations: Overlooked Social and Technical Considerations - While there are several sources of technical information on using pgp in general, and key signing in particular, this article emphasizes social aspects of key signing that are too often ignored, misleading or incorrect in the technical literature. There are also technical issues pointed out where I believe other documentation to be lacking. It is important to acknowledge and address social aspects in a system such as pgp, because the weakest link in the system is the human that is using it. The algorithms, protocols and applications used as part of a pgp system are relatively difficult to compromise or 'break', but the human user can often be easily fooled. Since the human is the weak link in this chain, attention must be paid to actions and decisions of that human; users must be aware of the pitfalls and know how to avoid them.

Bulletproof Virus Protection - Protect your network from costly security breaches with Guardian Digital’s multi-faceted security applications. More then just an email firewall, on demand and scheduled scanning detects and disinfects viruses found on the network. Click to find out more!

Take advantage of our Linux Security discussion list! This mailing list is for general security-related questions and comments. To subscribe send an e-mail to This email address is being protected from spambots. You need JavaScript enabled to view it. with "subscribe" as the subject.

Earn an NSA recognized IA Masters Online - The NSA has designated Norwich University a center of Academic Excellence in Information Security. Our program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Using interactive e-Learning technology, you can earn this esteemed degree, without disrupting your career or home life.

Security on your mind?

Protect your home and business networks with the free, community version of EnGarde Secure Linux. Don't rely only on a firewall to protect your network, because firewalls can be bypassed. EnGarde Secure Linux is a security-focused Linux distribution made to protect your users and their data.

Guardian Digital Makes Email Safe For Business - Microsoft 365, Goo....

Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headline.


FSF changes GPLv3 endgame
29th, March, 2007

The Free Software Foundation (FSF) is changing the final process of writing the third version of the GNU General Public License (GPLv3). Peter Brown, executive director of the FSF, says that the reasons for the change are the extensive revisions in the next draft and the need "to get the community back involved in the process" as it reaches a climax. The revisions deal with issues raised by the recent Novell-Microsoft deal, and by the community about language in the license about patents and digital rights management (DRM).

Companion textbook on IPv6 advanced protocols
27th, March, 2007

IPv6 is now in its deployment stage after having been in development with the IETF for over 10 years. KAME is the widely accepted reference implementation for IPv6 and IP security protocols developed on multiple variants of the BSD operating systems. This new book tackles more high level topics than its predecessor, IPv6 Core Protocols Implementation written by this same author team.

VoIP Still Faces Security Hangups
24th, March, 2007

After legal and regulatory victories, Internet voice remains a consumer play, as businesses remain skeptical.

Though Internet voice providers are overcoming some regulatory and legal hurdles, the major barrier standing between them and the mainstream corporate market is still a glaring lack of security, analysts say.

news/network-security/voip-still-faces-security-hangups
Is Web 2.0 a Security Risk?
26th, March, 2007

British firms are at risk of data leakage through their employees' increasing use of Web 2.0 technologies and social networking websites, security experts have warned.

A survey of more than 1000 office workers found that 42 percent of those aged between 18 and 29 discussed work-related issues on social networking sites and blogs.

news/network-security/is-web-20-a-security-risk
Enterasys Blades Add Security, Policy Routing to Switches
27th, March, 2007

Enterasys Networks this week unveiled new blades for its Matrix N-Series flow switches that feature improved routing and security capabilities.

The four new Diamond Distributed Forwarding Engines (DFEs), essentially new line cards, deliver high-density Gigabit Ethernet and 10 Gigabit Ethernet aggregation. The blades' architecture guarantees that only authorized users access information resources and prevents intruders from taking advantage of vulnerabilities to tap into business assets.

news/network-security/enterasys-blades-add-security-policy-routing-to-switches
IAB Chair Mulls DNS Security
29th, March, 2007

IAB chair Olaf Kolkman says DNSSEC isn