LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: December 12th, 2014
Linux Security Week: December 9th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Linux Security Week: August 1st, 2011 Print E-mail
User Rating:      How can I rate this item?
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Security Week Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.

LinuxSecurity.com Feature Extras:

What You Need to Know About Linux Rootkits - Rootkits are a way attackers hide their tracks and keep access to the machines they control. The good rootkits are very hard to detect and remove. They can be running on ones computer and no one can even know they have been running. Read more to learn how to detect them on your system.

Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition - Mark Sobell again delivers the answers to common Linux administration challenges, and provides thorough and step-by-step instructions to configuring many of the common Linux Internet services in A Practical Guide to Fedora and Red Hat Enterprise Linux, Fifth Edition.


  LulzSec and Anonymous are the least of your hacker worries (Jul 25)
 

LulzSec took down the CIA's website in mid-June in an effort to prove to the world that the hacker group should be taken seriously.

  Hacker group Anonymous launches operation to turn Breivik into Ďa joke' (Jul 27)
 

The hacker collective Anonymous is marshalling the power of the international online community to electronically bury Norwegian killer Anders Behring Breivik's rambling manifesto.

  Not Your Average Linux Distribution: DOD's Flavor (Jul 25)
 

The Department of Defense (DOD) has released a unique Linux distribution designed to be a secure option for people, such as telecommuters, who need remote access to internal government and corporate networks from potentially insecure desktops.

  US cyber security chief quits after hacker attacks (Jul 26)
 

The head of the US body responsible for combating cyber-attacks has resigned unexpectedly following a string of online assaults on the CIA and other government agencies.

  Apple Laptops Vulnerable To Hack That Kills Or Corrupts Batteries (Jul 26)
 

Your laptop's battery is smarter than it looks. And if a hacker like security researcher Charlie Miller gets his digital hands on it, it could become more evil than it appears, too.

  WASP: The Linux-powered flying spy drone that cracks Wi-Fi & GSM networks (Jul 29)
 

The Black Hat Security Conference and DEFCON bring together the world's professional hackers, security researchers, goverment representatives, journalists, and just about anyone who thinks of themselves as a hacker. They listen to talks about security, show off the latest novel hacks, and generally share information about the state of computer security.

  DoD Debuts a Brand-New Linux for Telecommuters (Jul 28)
 

With all the hundreds of Linux distributions already available for practically every niche and purpose, users of the open source operating system are accustomed to having a wealth of choices. Recently, however, the set of options got even bigger thanks to a brand-new, security-focused Linux distribution from none other than the U.S. Department of Defense.

  Blended Web Attacks Hitting More Websites (Jul 26)
 

The average large business's website sees 27 attacks per minute, though attackers--thanks to automation--can create spikes of up to seven attacks per second, or about 25,000 attacks per hour.

  Hacking Loopholes Remain, Consumers Deserve Better (Jul 25)
 

After an "Arab spring", it's been a summer of security breaches. But, while the press, politicians and police chiefs turn themselves inside-out over voicemail "hacking", each is overlooking the root cause - lax data security rules.

  Instant Insider: Harvard Hacker Breaches Network Security By Walking Right In (Jul 28)
 

This month brought another reminder that retailers have to defend their networks not just against thieves hacking in--but also against thieves walking in. A Harvard University activist (and fellow at Harvard's Center for Ethics, for what that's worth) named Aaron Swartz was indicted this month after he walked into an unguarded basement on the MIT campus, connected a laptop to a switch in a network wiring closet and spent the next two months illegally downloading millions of documents from a university archive.

  Inside Anonymous, Members Find Shelter in a Collective Voice (Jul 28)
 

Within the ranks of Anonymous, one member had crossed a line: He granted an interview to a reporter, discussing his role in the shadowy hacker group.

  LulzSec, Anonymous Hacker Arrests Won't Solve Security Attacks (Jul 28)
 

The FBI and Scotland Yard should be praised in their ability to track down, identify and arrest members of the related hacking organizations Anonymous and LulzSec. The cyber-sleuthing they did is not easy. When you have to do it well enough for the arrest to hold up in court, it's harder still. Unfortunately, it's not going to solve the problem.

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
University of California, Berkeley Hacked, Data Compromised
London teen pleads guilty to Spamhaus DDoS
New England security group shares threat intelligence, strives to bolster region
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.