Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: February 27th, 2015
Linux Security Week: February 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Linux Security Week: June 20th, 2011 Print E-mail
User Rating:      How can I rate this item?
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Security Week Thank you for reading the weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines. Feature Extras:

Using the sec-wall Security Proxy - This article full of examples will show you various ways to test services secured using sec-wall, a feature-packed high performance security proxy. We'll be using cURL, a popular Linux command line tool and PycURL - a Python interface to cURL. As of version 1.0, sec-wall supports HTTP Basic auth, digest auth, custom HTTP headers, XPath-based authentication, WS-Security & SSL/TLS client certificates and each of the options is being shown below.

sec-wall: Open Source Security Proxy - sec-wall, a recently released security proxy is a one-stop place for everything related to securing HTTP/HTTPS traffic. Designed as a pragmatic solution to the question of securing servers using SSL/TLS certificates, WS-Security, HTTP Basic/Digest Auth, custom HTTP headers, XPath expressions with an option of modifying HTTP headers and URLs on the fly.

  EnGarde Secure Community 3.0.22 Now Available!

Guardian Digital is happy to announce the release of EnGarde Secure Community 3.0.22 (Version 3.0, Release 22). This release includes many updated packages and bug fixes and some feature enhancements to the EnGarde Secure Linux Installer and the SELinux policy.

  How LulzSec Hackers Outsmart Security Gurus (Jun 16)

While the world argues whether the hacktivist group is more Robin Hood or terrorist, the big question is: how have the hacks been so successful? Security experts share some answers.

  Stuxnet: Anatomy of a Computer Virus (Jun 16)

Stumbled across this today in my Vimeo inbox. A very cool motion graphics piece that is "An infographic dissecting the nature and ramifications of Stuxnet, the first weapon made entirely out of code." Our Facebook fans seemed to respond well to it, so I thought I'd put it up as a Short of the Moment.

  Keeping up with the hackers (chart) (Jun 17)

The number of hacking events of late is making our heads spin at CNET. By our count, there's been more than 40 computer attacks, network intrusions, or data breaches in the last few months. And they seem to be a daily occurrence.

  Anonymous targeting Federal Reserve in next attack (Jun 14)

The Anonymous hacker group says it plans to target the Federal Reserve starting tomorrow, most likely with a distributed denial-of-service (DDoS) attack designed to shut down the agency's Web site.

  Titanic Takeover Tuesday: LulzSec's busy day of hacking escapades (Jun 15)

Lulz Security, the hacking group apparently motivated by nothing more than their desire to laugh at the mayhem they cause, has had a busy day in an event they called Titanic Takeover Tuesday. Taking a break from their dumps of user data and server break-ins, today saw the group perform a bunch of distributed denial of service attacks against a range of targets.

  Fraud Starts After Lulzsec Group Releases E-Mail, Passwords (Jun 17)

Debbie Crowell never ordered the iPhone, but thanks to a hacking group known as Lulzsec, she spent a good part of her Thursday morning trying to get US$712.00 in charges reversed after someone broke into her Amazon account and ordered it.

  Metasploit Exploit Bounty - Exploit List (Jun 15)

The Metasploit team is excited to announce a new incentive for community exploit contributions: Cash! Running until July 20th, our Exploit Bounty program will pay out $5,000 in cash awards (in the form of American Express gift cards) to any community member that submits an accepted exploit module for an item from our Top 5 or Top 25 exploit lists.

  Turkey arrests 32 Anonymous hackers for DDOS attacks (Jun 13)

Turkey responded to the hacking group Anonymous with 32 arrests following attacks on government websites, according to the country's state-run news agency.

  Hole found in Firefox 4 WebGL implementation (Jun 17)

A security hole has been discovered in the WebGL implementation of Firefox 4 by the British security researchers at Context Information Security. The researchers have been continuing their previous work looking for flaws in WebGL and have found they can perform a "memory stealing" attack using WebGL.

  Hackers break into U.S. Senate computers (Jun 14)

The Senate's website was hacked over the weekend, leading to a review of all of its websites, in the latest embarrassing breach of security to hit a major U.S.-based institution.

  LulzSec's stupid hack request line (Jun 15)

The hacker group Lulz Security has opened a telephone request line so its fans can suggest potential targets.It claims to have launched denial of service attacks on several websites as a result, although it did not detail which ones.

  Firefox 5 locks down, almost ready for release (Jun 16)

Today, Mozilla has updated the Firefox 5 beta to release candidate status (download for Windows | Mac | Linux), which includes improves support for "future-Web" technology, speeds up the browser, and makes multiple smaller tweaks to the browser.

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
DDoS Exploit Targets Open Source Rejetto HFS
Gemalto Confirms It Was Hacked But Insists the NSA Didnít Get Its Crypto Keys
Hackers exploit router flaws in unusual pharming attack
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.