LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: August 15th, 2014
Linux Advisory Watch: August 8th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Linux Security Week: May 9th, 2011 Print E-mail
User Rating:      How can I rate this item?
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Security Week Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.

LinuxSecurity.com Feature Extras:

sec-wall: Open Source Security Proxy - sec-wall, a recently released security proxy is a one-stop place for everything related to securing HTTP/HTTPS traffic. Designed as a pragmatic solution to the question of securing servers using SSL/TLS certificates, WS-Security, HTTP Basic/Digest Auth, custom HTTP headers, XPath expressions with an option of modifying HTTP headers and URLs on the fly.

Book Review: Linux Kernel Programming - As Linux is implemented on increasingly wider number of devices, the number of people responsible for developing and maintaining Linux on those platforms have increased. As the level of maturity of the kernel increases, so does the complexity, capabilities, and size. This book provides the Linux programmer the tools necessary to understand the core aspects of the kernel and how to interface with it.


  EnGarde Secure Community 3.0.22 Now Available!
 

Guardian Digital is happy to announce the release of EnGarde Secure Community 3.0.22 (Version 3.0, Release 22). This release includes many updated packages and bug fixes and some feature enhancements to the EnGarde Secure Linux Installer and the SELinux policy.

  NSA says no to Linux in best practice advisory (May 2)
 

Top US spooks are advising businesses to upgrade to Vista or Windows 7, claiming that other operating systems do not cut the mustard when it comes to security.

  How to disappear completely (May 5)
 

Almost everyone has a digital footprint these days. Think you could remove your tracks? Former skip tracer Frank Ahearn helps folks drop off the face of the Earth. In a world where we share more information online than ever before, it might seem impossible to disappear completely.

  Home Wi-Fi Network Security: 4 Ways to Avoid Big Trouble (May 3)
 

Locking down your home Wi-Fi network with a password is like making sure you eat your broccoli. It's probably good for you, but you probably think it's not much of a priority or a big deal. Well, it's time to make an attitude adjustment. It turns out that you can cause yourself a good deal of trouble by leaving that door to your system unlocked.

  NSA Best Practices Recommend Windows Over Linux For Security (May 4)
 

A best practices document released by the US National Security Agency has advised users against using open source operating system platforms like Linux.

  Microsoft, Juniper urged to patch dangerous IPv6 DoS hole (May 4)
 

Security experts are urging Microsoft and Juniper to patch a year-old IPv6 vulnerability so dangerous it can freeze any Windows machine on a LAN in a matter of minutes.

  Hacker pwns police cruiser and lives to tell tale (May 4)
 

As a penetration tester hired to pierce the digital fortresses of Fortune 1000 casinos, banks and energy companies, Kevin Finisterre has hacked electronic cash boxes, geologic-survey equipment, and on more than one occasion, a client's heating, ventilation, and air-conditioning system.

  Wrongly Jailed Security Whistleblower Caught Up in PlayStation Hacker Hunt (May 1)
 

Armchair cybersleuths on the trail of the PlayStation Network hackers have been focusing attention on a chat log that shows several technically sophisticated PlayStation tinkerers discussing Sony's security vulnerabilities in knowing detail just two months before the breach.

  Sony Online Shuts Down Its Servers Following "Intrusion" (May 2)
 

While Sony Computer Entertainment's still hard at work attempting to restore Playstation Network after the much-talked security breach, their Online division (Sony Online Entertainment) got hacked this morning.

  IBM endorses Red Hat's KVM virtualization (May 5)
 

A year after dropping Xen virtualization from its Linux software, Red Hat is still a niche player in the virtualization market. But the comapny is gaining some recognition for the KVM hypervisor.

  Nikon image authentication system cracked (May 5)
 

Russian encryption specialist ElcomSoft has discovered flaws in Nikon's systems for ensuring that images have not been tampered with.

  Another 25 million Sony users compromised (May 3)
 

After apologising for the breach in security that saw 77 million user records compromised, Sony has announced that it has discovered 25 million user records were also compromised on Sony Online Entertainment's systems.

  Experts Say Encrypted Credit Card Number Does Not Fully Protect Sony Customers (May 2)
 

Sony Co., in a blog post Thursday, announced that every single important record from the breached credit card database last week was encrypted. But, security experts say it was not enough to fully protect the Sony PlayStation users and that consumer data might still be used by the hackers.

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Attackers Can ‘Steal’ Bandwidth From BitTorrent Seeders, Research Finds
Linux Kernel Development Gets Two-Factor Authentication
Hacking cars and traffic lights at Def Con
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.