LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 7th, 2014
Linux Advisory Watch: April 4th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Linux Security Week: August 22nd, 2011 Print E-mail
User Rating:      How can I rate this item?
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Security Week Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.

LinuxSecurity.com Feature Extras:

What You Need to Know About Linux Rootkits - Rootkits are a way attackers hide their tracks and keep access to the machines they control. The good rootkits are very hard to detect and remove. They can be running on ones computer and no one can even know they have been running. Read more to learn how to detect them on your system.

Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition - Mark Sobell again delivers the answers to common Linux administration challenges, and provides thorough and step-by-step instructions to configuring many of the common Linux Internet services in A Practical Guide to Fedora and Red Hat Enterprise Linux, Fifth Edition.


  10 Linux Server Distros That Could Save You a Bundle (Aug 15)
 

Businesses require reliability, stability and compatibility. It's no wonder business owners prefer to stick with the status quo: It's what works for them. Those entrepreneurs who take the time to research the possibilities outside that status quo find a treasure trove of free and low-cost alternatives. When it comes to software, Linux is at the top of that list. With more than 100 complete distributions from which to choose, Linux is far from a single entity.

  Kevin Mitnick, Former Fugitive Hacker, Laments How The Game Has Changed (Aug 17)
 

By 1992, federal agents were closing in on Kevin Mitnick, the FBI's most-wanted hacker. But he already knew this; he was watching them.

  How a Hacker Mastermind Was Brought Down by His Love of Xbox (Aug 17)
 

If you're a hacker, you can't trust anyone. Even the fellow gamers in an Xbox forum. That's how an 18-year-old leader of the notorious hacking group Lulz Security got tripped up, according to one of his comrades.

  Firefox 6.0 adds clutch of useful security tweaks (Aug 16)
 

The latest accelerated release for Firefox, version 6.0, arrives this week but what can users expect in advance of the more significant changes promised for version 7.0 later this year? The answer for now is better security.

  Hackers Use Botnets To Search For Victims (Aug 17)
 

Hackers are using botnets to generate more than 80,000 search queries a day, allowing them to identify potential attack targets in a very short time and with minimal effort.

  Hackers bypass Google security for cyber reconnaissance (Aug 17)
 

Imperva's hacker intelligence initiative yesterday revealed that hackers are now using search engines to facilitate thousands of risk-free attacks.

  Lessons learned from a recent Amazon outage (Aug 16)
 

Another Amazon cloud-services outage occurred on Sunday, August 7th in a Dublin, Ireland data center. This one occurred due to a lightning strike that hit a transformer near the Dublin data center. It led to an explosion and fire that knocked out all utility services thereby leading to a total data center outage. Amazon had its only European data center located there.

  Security expert warns hackers can attack Android (Aug 16)
 

A mobile security expert says he has found new ways for hackers to attack phones running Google Inc's Android operating system.

  First dent in the AES crypto algorithm (Aug 19)
 

A team of researchers has discovered a first vulnerability in the AES encryption standard that shortens the algorithm's effective key length by two bits. This means that the usual key lengths of 128, 192 and 256 bits are reduced to 126, 190 and 254 bits.

  Check WordPress for Exploits (Aug 15)
 

Whether you use WordPress for your personal blog, or your organization uses it for its entire Web site, ensuring its security is a good thing. One tool that can help secure WordPress is the the Exploit Scanner plugin.

  Researchers Expose Cunning Online Tracking Service That Can't Be Dodged (Aug 15)
 

Researchers at U.C. Berkeley have discovered that some of the net's most popular sites are using a tracking service that can't be evaded -- even when users block cookies, turn off storage in Flash, or use browsers' "incognito" functions.

  Beware of rising phone hacking incidents (Aug 19)
 

Phone hacking incidents are on the rise and users need to take measures to prevent their phone conversations from being breached, warn industry watchers who say hackers today deploy various tactics to intercept conversations on landline as well as mobile phones.

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.