LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 21st, 2014
Linux Security Week: April 7th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Linux Security Week: August 29th, 2011 Print E-mail
User Rating:      How can I rate this item?
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Security Week Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.

LinuxSecurity.com Feature Extras:

What You Need to Know About Linux Rootkits - Rootkits are a way attackers hide their tracks and keep access to the machines they control. The good rootkits are very hard to detect and remove. They can be running on ones computer and no one can even know they have been running. Read more to learn how to detect them on your system.

Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition - Mark Sobell again delivers the answers to common Linux administration challenges, and provides thorough and step-by-step instructions to configuring many of the common Linux Internet services in A Practical Guide to Fedora and Red Hat Enterprise Linux, Fifth Edition.


  Linux Hardening - Quick Wins (Aug 22)
 

The best way to ensure that your Linux server is secure is to build it from scratch with a minimum amount of code that can be exploited by a hacker -- a custom compiled kernel and the bare minimum of packages needed for the server to do its intended job.

  UPnP-enabled routers allow attacks on LANs (Aug 24)
 

Routers from various manufacturers support UPnP (Universal Plug and Play) on their WAN interfaces, which apparently makes it possible for attackers to reconfigure them remotely via the internet and, for example, misuse them as surfing proxies or to infiltrate internal LANs. The problem was discovered by IT security specialist Daniel Garcia, who has developed the Umap tool to demonstrate the problem; the tool is available to download free of charge.

  Burning Question: Should I Use My Browser's Do-Not-Track Setting? (Aug 25)
 

Judging by the frenzied claims of lawmakers like US representative Jackie Speier, enabling the Do Not Track feature ranks up there with locking doors and shredding credit card statements. "People have a right to surf the web without Big Brother watching their every move and announcing it to the world," Speier said last February,when she introduced a bill to regulate online tracking.

  Anonymous Hackers Are Hypocrites, Not Hacktivists (Aug 23)
 

The hacker group Anonymous, which is less a coherent group of people working together toward a common cause than a random medley of hackers out to prank and disrupt the online world, has been busy these days. Multiple hacks on Bay Area Rapid Transit websites in response to BART's shutdown of the railway's underground cellular system have captured the attention of activists and technophiles alike.

  Cloud computing: If hackers want access, they'll get it (Aug 23)
 

Cloud providers that store client data on shared or virtual servers must ensure that private customer information cannot be accessed in the event of a cyber attack or a server being hacked, according to search specialists, Simplexo.

  Tool causes Apache web server to freeze - Update (Aug 25)
 

A previously unknown flaw in the code for processing byte range headers allows version 2.2.x of the Apache Web Server to be crippled from a single PC. A suitable "Apache Killer" Perl script that impressively demonstrates the problem has already been published on the Full Disclosure mailing list.

  Confessions of a hacker (Aug 22)
 

Before there was Anonymous or LulzSec or any number of other contemporary computer hackers, there was Kevin Mitnick. After a prolific criminal career, time in prison, and a transition to a computer security career, Mitnick shares his story.

  WebKit security holes haunt Ubuntu (Aug 25)
 

According to an Ubuntu security alert, the WebKit flaws are dangerous enough to cause arbitrary code execution attacks.

  SpyEye hacker toolkit to lead to surge in cyberattacks (Aug 22)
 

The odds that a cybergang will stealthily turn your PC into a bot this summer and use it to carry out all manner of cyberattacks just notched notably higher.

  When hackers become The Man (Aug 24)
 

At DefCon III in 1995, the young crowd of 470 spent their time jamming a local radio station broadcast and playing Hacker Jeopardy at midnight when they couldn't drink at the bar. "Free Kevin" stickers were plastered everywhere protesting the jailing of fugitive hacker Kevin Mitnick, and a 14-year-old ran away from home to attend the event. (I know because I was there.)

  Hackers compete in security breach league (Aug 23)
 

A new website aims to establish who the world's most talented hacker is by allowing members to compete for ranking points by breaching internet security systems.

  Did Kevin Mitnick do a disservice to the security community? (Aug 23)
 

Some say famed hacker Kevin Mitnick is blowing a golden opportunity to cast the hacker community in a more positive light as he pushes his book "Ghost in the Wires."

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.