LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: August 25th, 2014
Linux Advisory Watch: August 15th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Linux Security Week: October 10th, 2011 Print E-mail
User Rating:      How can I rate this item?
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Security Week Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.

LinuxSecurity.com Feature Extras:

Free Online security course (LearnSIA) - A Call for Help - The Survivability and Information Assurance (SIA) course was originally developed by a team at Carnegie Mellon, led by Lawrence Rogers (http://www.cert.org/sia/). Back in 2010, I requested a license to continue the development of the course because it provides useful information on Information Assurance. Also, this course will always be freely available for anyone to use in the classroom or self-study. There are three parts to the LearnSIA curriculum.

What You Need to Know About Linux Rootkits - Rootkits are a way attackers hide their tracks and keep access to the machines they control. The good rootkits are very hard to detect and remove. They can be running on ones computer and no one can even know they have been running. Read more to learn how to detect them on your system.


  CSI:Internet (Oct 3)
 

It's one of those rare Saturday afternoons when the sun is actually shining. I'm just wondering how much meat to buy for the barbecue when my mobile rings. It's Hans he nervously confesses to me that he thinks he's caught himself a virus.

  How to lock down Linux (Oct 4)
 

Any operating system can be cracked if you don't adequately protect it. Yes, even Linux. Here are some security basics on how to protect your Linux systems.

  VPN Intranet Over the Internet: Understanding Multiprotocol Label Switching (Oct 4)
 

It's easy to set up a Virtual Private Network (VPN) for individuals. Trying to set up private networks over the public Internet for branch offices -- that's harder. To make VPNs work across multiple offices, you need to scale at an entirely different level to handle the traffic. That's where Multiprotocol Label Switching (MPLS) comes in.

  Hacker group Anonymous threatens to "erase" NYSE from Internet (Oct 5)
 

Notorious hacker group Anonymous has threatened to hack into the computer system of the New York Stock Exchange.

  The Air Force's secure Linux distribution (Oct 3)
 

Linux has long had a close, working relationship with governments, but Lightweight Portable Security (LPS) is the first official U.S. Linux distribution.

  Kernel Developers Share Security Tips (Oct 5)
 

As most folks know by now, a security breach affecting kernel.org was discovered in September. While that didn't affect kernel sources, it did get Linux kernel developers to thinking about their personal system security--and it might not be a bad idea for others to do the same.

  Are you an IT security leader - really? (Oct 4)
 

An astonishing number of survey respondents believe they are IT security leaders. But what does it really take to be a leader, and how does your organization stack up? A surprisingly high--unreasonably high, in fact--number of organizations think their security program is part of the vanguard of risk management.

  Wi-Fi users not as safe as they think, survey says (Oct 6)
 

Among Wi-Fi users, there's a big gap between knowing about Wi-Fi security and keeping their network and devices secure, as revealed by the Wi-Fi Security Barometer Survey results that the Wi-Fi Alliance announced today.

  Technical IT Security Conference To Discuss Stuxnet Proliferation (Oct 3)
 

Stuxnet and SCADA security will be discussed at this year's Hacker Halted USA, October 25-27 in Miami, Florida. The premier east coast information security conference is devoting an entire track to SCADA and Critical Infrastructure threats and will provide presentations from leading industry experts and a panel discussion on Stuxnet proliferation moderated by The Washington Times security reporter Shaun Waterman. More information can be found at www.hackerhalted.com

  Steve Jobs And Tech Security (Oct 7)
 

The death of Steve Jobs is triggering not a little reflection over the impact that one man could have over the form and function of the technology we use every day. The Apple II and Apple Macintosh were systems on which many of today's technology professionals first cut their teeth. In more recent years, the iPod, iPhone, and iPad came to reshape or outright define our notions of what constituted an MP3 player, smartphone, or tablet.

  Lessons From the RSA Breach (Oct 5)
 

In the world of ICT security "the fundamental threat landscape has changed" -- again -- in the past 18 months, says Andy Solterbeck, Australia-NZ general manager for security specialist RSA.

  Apache hole allows attackers to access internal servers (Oct 6)
 

Security experts at Context have discovered a hole in the Apache web server that allows remote attackers to access internal servers. The mod_rewrite rewrite engine ensures that requests are distributed across different servers according to definable rules, for example, in order to balance loads or to separate dynamic and static content.

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Mozilla reports user data leak from Bugzilla project
These 3-D Printed Skeleton Keys Can Pick High-Security Locks in Seconds
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.