Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.

LinuxSecurity.com Feature Extras:

What You Need to Know About Linux Rootkits - Rootkits are a way attackers hide their tracks and keep access to the machines they control. The good rootkits are very hard to detect and remove. They can be running on ones computer and no one can even know they have been running. Read more to learn how to detect them on your system.

Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition - Mark Sobell again delivers the answers to common Linux administration challenges, and provides thorough and step-by-step instructions to configuring many of the common Linux Internet services in A Practical Guide to Fedora and Red Hat Enterprise Linux, Fifth Edition.


Meet Comex, The 19-Year-Old iPhone Uber-Hacker Who Keeps Outsmarting Apple (Aug 2)

Nicholas Allegra lives with his parents in Chappaqua, New York. The tall, shaggy-haired and bespectacled 19-year old has been on leave from Brown University since last winter, looking for an internship. And in the meantime, he's been spending his days on a hobby that periodically sends shockwaves through the computer security world: seeking out cracks in the source code of Apple's iPhone, a device with more software restrictions than practically any computer on the market, and exploiting them to utterly obliterate its defenses against hackers.

(Aug 3)

Security experts have discovered the biggest series of cyber attacks to date, involving the infiltration of the networks of 72 organizations including the United Nations, governments and companies around the world.

When hacking Chrome, it's all about your data (Aug 4)

Google touts the Chrome OS as being free from traditional security concerns like malware, but it's still vulnerable to entirely different kinds of attacks, two researchers from the firm WhiteHat Security told Black Hat attendees here today.

(Aug 5)

This week, serious hackers are gathering in Las Vegas to attend Def Con 19, which follows closely on the heels of the Black Hat Technical Security Training and Briefings

Hacker can shut down Apple MacBook battery (Aug 5)

Forget computer viruses and worms. What's maybe the worst thing a hacker could do to your laptop? Access it remotely and shut it down -- or maybe even blow it up.

Hackers take out US security contractor (Aug 1)

Hacking group Anonymous claims to have broken into the network of US government contractor Mantech and posted some NATO-related correspondence online.

(Aug 3)

The National Security Agency has a challenge for hackers who think they're hot stuff: Prove it by working on the "hardest problems on Earth." Computer hacker skills are in great demand in the U.S. government to fight the cyberwars that pose a growing national security threat -- and they are in short supply.

AntiSec in massive law enforcement smackdown (Aug 1)

Anonymous hackers associated with the AntiSec movement have downed at least 70 law enforcement websites.The hackers also managed to extract "massive amounts" of confidential documents, including email spools, usernames, social security numbers, residential addresses, phone numbers, password dumps, classified documents, internal training files and informant lists.

(Aug 4)

When Google first started talking about its Google Chrome OS software a few years ago, one of the selling points was the promise that it would come with much better built-in security than other operating systems. Now, Chrome OS has only been commercially available for a few months, and security researchers have already figured out how to hack it.

(Aug 1)

According to a report in The Washington Post, the cost of the RSA hack which compromised the security of RSA's SecurID products was $66 million. The Post quoted a conference call with David Goulden, EMC Executive Vice President and Chief Financial Officer, in which he stated that "We incurred an accrued cost associated with investigating the attack, hardening our systems and working with customers to implement our remediation programs."