LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: September 15th, 2014
Linux Security Week: September 8th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Linux Security Week: July 5th, 2011 Print E-mail
User Rating:      How can I rate this item?
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Security Week Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.

LinuxSecurity.com Feature Extras:

Using the sec-wall Security Proxy - This article full of examples will show you various ways to test services secured using sec-wall, a feature-packed high performance security proxy. We'll be using cURL, a popular Linux command line tool and PycURL - a Python interface to cURL. As of version 1.0, sec-wall supports HTTP Basic auth, digest auth, custom HTTP headers, XPath-based authentication, WS-Security & SSL/TLS client certificates and each of the options is being shown below.

sec-wall: Open Source Security Proxy - sec-wall, a recently released security proxy is a one-stop place for everything related to securing HTTP/HTTPS traffic. Designed as a pragmatic solution to the question of securing servers using SSL/TLS certificates, WS-Security, HTTP Basic/Digest Auth, custom HTTP headers, XPath expressions with an option of modifying HTTP headers and URLs on the fly.


  2011 CWE/SANS Top 25 Most Dangerous Software Errors (Jul 1)
 

The 2011 CWE/SANS Top 25 Most Dangerous Software Errors is a list of the most widespread and critical errors that can lead to serious vulnerabilities in software. They are often easy to find, and easy to exploit. They are dangerous because they will frequently allow attackers to completely take over the software, steal data, or prevent the software from working at all.

  Keyboard Anarchists (Jul 1)
 

For months we've been reading about hacker groups like Lulz Security who reportedly have no agenda other than to create mayhem and laugh-snort at their own clever online exploits.

  Vulnerability analysis for IPv6 networks (Jul 1)
 

Security Manager 1.5 is a revamped version of Greenbone's security appliance; it is now able to test devices on IPv6 networks for vulnerabilities and pass its findings to Sourcefire's intrusion detection and prevention systems.

  LulzSec Goes Out With A Bang; Battlefield Heroes, Others Hacked (Jun 27)
 

On Saturday, Lulz Security announced what would be their final release, indicating that the group of six (according to the release) would disband.

  Ubuntu Linux, Day 24: More Secure By Default (Jun 27)
 

As I have gone through the 30 Days With Ubuntu Linux experience--and especially the past couple days as I have toyed with Wine and trying to get Windows software to run within Ubuntu--I have seen ample evidence of the security features of the OS. Simply put, Ubuntu Linux (and, I assume, Linux in general) is more secure by default.

  FBI Raids Iowa Woman's Home in Lulz Security Hacker Investigation (Jun 29)
 

The hacking group Lulz Security ended its 50-day reign of terror this weekend, but law enforcement's hunt for its members will go on. Last week, FBI agents raided an Iowa woman's home because of her connections to the group.

  From WikiLeaks to SB 1070--The Rise of the New Global Hacktivists (Jun 28)
 

When the Electronic Frontier Foundation's John Perry Barlow tweeted last December, "The first serious infowar is now engaged. The field of battle is WikiLeaks. You are the troops," many in the mainstream media rolled their eyes and dismissed his words as hacker hyperbole.

  FBI raids homes of two alleged hackers (Jul 1)
 

The FBI searched two US residences in the past week as part of its probe into alleged hacking by members of a now-defunct group known as Lulz Security.

  Robert Morris, Pioneer in Computer Security, Dies at 78 (Jun 30)
 

Robert Morris, a cryptographer who helped developed the Unix computer operating system, which controls an increasing number of the world's computers and touches almost every aspect of modern life, died on Sunday in Lebanon, N.H. He was 78.

  Most hack attacks could have been prevented, says study (Jun 28)
 

Many of the highest-profile computer hacking attacks of the past year took advantage of common, well-known software flaws and could have been prevented with a solid testing and review process, according to an analysis supported by the US Department of Homeland Security.

  Sony CEO blurs line between Linux and piracy at shareholders' meeting (Jun 30)
 

Sony CEO Howard Stringer told shareholders that his company was the target of hacker attacks in April "because we tried to protect our IP (intellectual property), our content, in this case videogames."

  LulzSec Successors Press On, Hitting Viacom, AZ (Jul 1)
 

Less than a week after hactivist group LulzSec called it quits, a hacker group to which its members migrated mounted separate attacks on Viacom and Vivendi SA's Universal Music Group as well as on a previous LulzSec target, the Arizona Department of Public Safety (DPS).

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Middle-School Dropout Codes Clever Chat Program That Foils NSA Spying
FreeBSD Patches DoS Vulnerability
Rogue cell towers discovered in Washington, D.C.
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.