Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Linux Security Week: May 2nd, 2011 Print E-mail
User Rating:      How can I rate this item?
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Security Week Thank you for reading the weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines. Feature Extras:

sec-wall: Open Source Security Proxy - sec-wall, a recently released security proxy is a one-stop place for everything related to securing HTTP/HTTPS traffic. Designed as a pragmatic solution to the question of securing servers using SSL/TLS certificates, WS-Security, HTTP Basic/Digest Auth, custom HTTP headers, XPath expressions with an option of modifying HTTP headers and URLs on the fly.

Book Review: Linux Kernel Programming - As Linux is implemented on increasingly wider number of devices, the number of people responsible for developing and maintaining Linux on those platforms have increased. As the level of maturity of the kernel increases, so does the complexity, capabilities, and size. This book provides the Linux programmer the tools necessary to understand the core aspects of the kernel and how to interface with it.

  EnGarde Secure Community 3.0.22 Now Available!

Guardian Digital is happy to announce the release of EnGarde Secure Community 3.0.22 (Version 3.0, Release 22). This release includes many updated packages and bug fixes and some feature enhancements to the EnGarde Secure Linux Installer and the SELinux policy.

  Why Your Linux Desktop is Insecure (Apr 25)

Of the many reasons why Linux on the desktop never happened, security was not one. After all, security was a strength of Linux on the desktop, was it not? Maybe, relatively, back in the day, but today Linux actually looks a bit archaic from a security standpoint. One major reason for this was outlined recently by famed security researcher and developer Joanna Rutkowska,

  Meet the fastest public-key algorithm few have even heard of (Apr 27)

Here comes the fastest public-key algorithm that most people have never heard of: It's called NTRUEncrypt and this month was approved by the financial services standards body, the Accredited Standards Committee X9.

  'Wardriving' Hackers Cracked Wi-Fi Networks From Black Mercedes (Apr 26)

Seattle police are investigating a criminal ring they believe used a specially outfitted Mercedes to hack into the Wi-Fi networks of area businesses, a practice called "wardriving."

  Hacking The NOOK Color To Run Honeycomb (Apr 25)

A few weeks ago, I posted my thoughts on Barnes & Noble's NOOK Color. Thanks to the many readers who left comments and suggestions. Continuing my experimentation with the tablet-based e-reader, I decided to bite the bullet and see how far it could go as an Android tablet.

  Sony PlayStation Network Down While Hacker Proof System Built (Apr 25)

The Sony PlayStation network down news for PS3 and Qriocity players is sobering. The network has been down for several days following an "external intrusion" a.k.a. hacker attack. Sadly, the PSN will be down longer while more security is put in place.

  Google opens peephole on mystery data center practices (Apr 25)

Google has released a video showing at least some of the security and data protection techniques used in its worldwide network of data centers.

  DHS chief: What we learned from Stuxnet (Apr 26)

If there's a lesson to be learned from last year's Stuxnet worm, it's that the private sector needs to be able to respond quickly to cyber-emergencies, the head of the U.S. Department of Homeland Security said Monday.

  Latvian hack's hack story leads to hack-hacking (Apr 28)

An enraged Latvian hacker went batshit over an article criticising security at small, low-cost hosting companies and defaced the website of the news agency LETA.

  Insecure Defaults Lead to Mass Open Proxies in China (Apr 27)

A security blogger has uncoverd a flaw in the Chinese PPLive video streaming software. A new port, TCP port 9415, was appearing regularly on websites that list open proxies. Most of these open proxies were based in China. However, some were also based within Taiwan, Hong Kong and there were small a small number within the United States.

  Targeted hard drive fragmentation as a covert data channel (Apr 26)

A team of researchers has presented a steganographic technique which can be used to conceal data on a hard drive. The technique is essentially based on targeted fragmentation of clusters when saving a file in the FAT file system.

  How to Avoid Spear Phishing Attacks (Apr 29)

It's not clear exactly how much personal data the perpetrators of the Sony PlayStation Network hack obtained, but is definitely much worse that the Epsilon data breach earlier this month. The Epsilon breach just exposed names and email addresses, information that's easy enough to obtain.

  PlayStation Network hack: industry reactions and theories (Apr 29)

With the details of 77 million customers involved, the PlayStation Network hack is one of the largest ever malicious attacks on a commercial network. Although Sony is assuring gamers that the network is being strengthened, the hack has once again raised questions about the security of online transactions.

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
FBI Quietly Removes Recommendation To Encrypt Your Phone
And the prize for LEAST SECURE BROWSER goes to ... Chrome!
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.