Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.

LinuxSecurity.com Feature Extras:

sec-wall: Open Source Security Proxy - sec-wall, a recently released security proxy is a one-stop place for everything related to securing HTTP/HTTPS traffic. Designed as a pragmatic solution to the question of securing servers using SSL/TLS certificates, WS-Security, HTTP Basic/Digest Auth, custom HTTP headers, XPath expressions with an option of modifying HTTP headers and URLs on the fly.

Book Review: Linux Kernel Programming - As Linux is implemented on increasingly wider number of devices, the number of people responsible for developing and maintaining Linux on those platforms have increased. As the level of maturity of the kernel increases, so does the complexity, capabilities, and size. This book provides the Linux programmer the tools necessary to understand the core aspects of the kernel and how to interface with it.


Guardian Digital is happy to announce the release of EnGarde Secure Community 3.0.22 (Version 3.0, Release 22). This release includes many updated packages and bug fixes and some feature enhancements to the EnGarde Secure Linux Installer and the SELinux policy.

(Apr 25)

Of the many reasons why Linux on the desktop never happened, security was not one. After all, security was a strength of Linux on the desktop, was it not? Maybe, relatively, back in the day, but today Linux actually looks a bit archaic from a security standpoint. One major reason for this was outlined recently by famed security researcher and developer Joanna Rutkowska,

Meet the fastest public-key algorithm few have even heard of (Apr 27)

Here comes the fastest public-key algorithm that most people have never heard of: It's called NTRUEncrypt and this month was approved by the financial services standards body, the Accredited Standards Committee X9.

(Apr 26)

Seattle police are investigating a criminal ring they believe used a specially outfitted Mercedes to hack into the Wi-Fi networks of area businesses, a practice called "wardriving."

Hacking The NOOK Color To Run Honeycomb (Apr 25)

A few weeks ago, I posted my thoughts on Barnes & Noble's NOOK Color. Thanks to the many readers who left comments and suggestions. Continuing my experimentation with the tablet-based e-reader, I decided to bite the bullet and see how far it could go as an Android tablet.

Sony PlayStation Network Down While Hacker Proof System Built (Apr 25)

The Sony PlayStation network down news for PS3 and Qriocity players is sobering. The network has been down for several days following an "external intrusion" a.k.a. hacker attack. Sadly, the PSN will be down longer while more security is put in place.

Google opens peephole on mystery data center practices (Apr 25)

Google has released a video showing at least some of the security and data protection techniques used in its worldwide network of data centers.

DHS chief: What we learned from Stuxnet (Apr 26)

If there's a lesson to be learned from last year's Stuxnet worm, it's that the private sector needs to be able to respond quickly to cyber-emergencies, the head of the U.S. Department of Homeland Security said Monday.

Latvian hack's hack story leads to hack-hacking (Apr 28)

An enraged Latvian hacker went batshit over an article criticising security at small, low-cost hosting companies and defaced the website of the news agency LETA.

(Apr 27)

A security blogger has uncoverd a flaw in the Chinese PPLive video streaming software. A new port, TCP port 9415, was appearing regularly on websites that list open proxies. Most of these open proxies were based in China. However, some were also based within Taiwan, Hong Kong and there were small a small number within the United States.

Targeted hard drive fragmentation as a covert data channel (Apr 26)

A team of researchers has presented a steganographic technique which can be used to conceal data on a hard drive. The technique is essentially based on targeted fragmentation of clusters when saving a file in the FAT file system.

(Apr 29)

It's not clear exactly how much personal data the perpetrators of the Sony PlayStation Network hack obtained, but is definitely much worse that the Epsilon data breach earlier this month. The Epsilon breach just exposed names and email addresses, information that's easy enough to obtain.

PlayStation Network hack: industry reactions and theories (Apr 29)

With the details of 77 million customers involved, the PlayStation Network hack is one of the largest ever malicious attacks on a commercial network. Although Sony is assuring gamers that the network is being strengthened, the hack has once again raised questions about the security of online transactions.