Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Linux Security Week: July 18th, 2011 Print E-mail
User Rating:      How can I rate this item?
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Security Week Thank you for reading the weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines. Feature Extras:

What You Need to Know About Linux Rootkits - Rootkits are a way attackers hide their tracks and keep access to the machines they control. The good rootkits are very hard to detect and remove. They can be running on ones computer and no one can even know they have been running. Read more to learn how to detect them on your system.

Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition - Mark Sobell again delivers the answers to common Linux administration challenges, and provides thorough and step-by-step instructions to configuring many of the common Linux Internet services in A Practical Guide to Fedora and Red Hat Enterprise Linux, Fifth Edition.

  How to secure your data with Truecrypt in 11 easy steps! (Jul 11)

Truecrypt, is a free and open-source disk encryption software. In this post we will show you how to encrypt all your data using Truecrypt in 11 easy steps.

  Best free alternatives to top-selling software (Jul 13)

Later this month I'll be canceling my subscription to a leading security suite that runs on two of my home-office PCs. I'll replace it with Microsoft's free Security Essentials, which I've been using on my notebook since I bought it two years ago. I realized several months ago that I simply no longer needed to spend money for the convenience of an all-in-one security app.

  The problem with doing - and not doing - an iPhone jailbreak (Jul 11)

Code that exploits two iPhone flaws to allow people to jailbreak their devices could, ironically, force security-conscious users to use the vulnerabilities to jailbreak their own iPhones and apply a third-party patch.

  "Depraved" Wi-Fi hacker gets 18 years in prison (Jul 14)

A Minnesota man has been sentenced to 18 years in prison after he hacked a neighbor's Wi-Fi router and then launched a vengeful two-year campaign to frame them with child pornography and threats to government officials, including Vice President Joe Biden.

  Hackers steal sensitive US military documents (Jul 15)

The Pentagon has admitted that a foreign intelligence service stole 24,000 files from a US defence contractor earlier this year.

  New Firefox beta enhances security and tablet viewing (Jul 11)

The latest Firefox beta jumps to version 6 and lands with improvements made to security, tablet appearance, memory management, and Android fixes. Download for Windows, Mac, Linux, and Android, Firefox 6 beta comes with a laundry list of changes made to both desktop and mobile platforms.

  David Litchfield on securing the data castle (Jul 13)

What can organizations do to better secure their databases? Who better to address that question than noted database security expert David Litchfield?

  AntiSec: Booz Allen Hamilton Confirm Anonymous Hacker Raid's Authenticity (Jul 13)

Leading U.S. Government and defence consultancy Booz Allen Hamilton has confirmed a breach in its cyber security, adding credence to Anonymous hackers previous claims.

  Hackers find security loopholes in Vodafone's network (Jul 14)

THC claims it can listen to any call, use other accounts to make calls and access the victim's voice mail. Hackers have claimed that they have successfully re-engineered a standard consumer hardware available from Vodafone store to intercept calls and gain administrator access into other user accounts.

  Hackers Slurp over a million user accounts from Washington Post (Jul 14)

The Washington Post website has been hit with a double security breach. Hackers have made off with around 1.3 million user IDs and email address from the "Jobs" section of the site. The attackers were able to gain access on two separate occasions: on the 27th and 28th of June.

  Adobe releases a 64-bit Flash Player 11 beta (Jul 14)

SOFTWARE DEVELOPER Adobe has released a public beta for its Flash Player 11 that brings 64-bit support to Windows, Mac OS X and Linux.

  Linux: Secure as a brick (Jul 18)

People who are familiar with me know that there are two things I'm not forgiving about. The first is backups, the second is security.

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.