LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 21st, 2014
Linux Security Week: April 7th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Linux Security Week: February 6th, 2012 Print E-mail
User Rating:      How can I rate this item?
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Security Week Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.

LinuxSecurity.com Feature Extras:

Password guessing with Medusa 2.0 - Medusa was created by the fine folks at foofus.net, in fact the much awaited Medusa 2.0 update was released in February of 2010. For a complete change log please visit http://www.foofus.net/jmk/medusa/changelog

Password guessing as an attack vector - Using password guessing as an attack vector. Over the years we've been taught a strong password must be long and complex to be considered secure. Some of us have taken that notion to heart and always ensure our passwords are strong. But some don't give a second thought to the complexity or length of our password.


  Ex-Hacker Mafiaboy Discusses Local Government Web Security (Jan 31)
 

Last July, a hacker broke into Yellowstone County, Mont.'s website, prompting the county to disable the site. In September 2011, two men with alleged ties to the online activist group Anonymous were indicted for hacking into Santa Cruz County, Calif., computers in December 2010, causing the county website to go offline.

  Hacker's Demo Shows How Easily Credit Cards Can Be Read Through Clothes And Wallets (Jan 30)
 

Pull out your credit card and flip it over. If the back is marked with the words "PayPass," "Blink," that triangle of nested arcs that serves as the universal symbol for wireless data or a few other obscure icons, Kristin Paget says it's vulnerable to an uber-stealthy form of pickpocketing.

  Linux 3.2 Kernel: What To Consider Before Updating (Jan 30)
 

There are few things in life more exciting than a new system update for your favorite Linux distribution. Often, system updates can bring performance enhancements or simply address problematic security issues. These updates are generally considered a good thing. But when it comes to installing kernel updates, there are some critical factors that must be considered.

  Linux, Open Source & Ubuntu: Cloud Computing, Security, Big Data (Jan 30)
 

A recent Linux Foundation survey shows that open-source technology is poised for continued growth among new and existing users for a variety of reasons, including lower total cost of ownership, technical features and security. The survey, released in January, is entitled "Linux Adoption Trends 2012: A Survey of Enterprise End Users," and is co-written by the Linux Foundation and the Yeoman Technology Group.

  Wanted: Ethical hackers (Jan 30)
 

Recently, the website of Ankit Fadia, a well-known ethical hacker, was hacked by another group that goes by the name Team Grey Hat (TGH). The "hactivist" group entered Ankit Fadia's official site and exposed his credentials, including sensitive data, student details, database credentials (like name, user name & password).

  Supreme Court of Sweden Upholds Pirate Bay Prison Sentences (Feb 1)
 

Sweden's Supreme Court on Wednesday upheld the prison sentences of the four founders of The Pirate Bay, the notorious file-sharing service on Hollywood's and the recording industry's most-hated list.

  4 Ways to Prevent Domain Name Hijacking (Feb 2)
 

On the night of Monday, January 23, the hacktivist group UGNazi hijacked Coach.com, the Internet domain name of luxury goods manufacturer Coach. For several hours, fashionistas who wanted to ogle Coach's new Willis handbag on Coach.com or get a deal on its Penelope shoulder bag at Coachfactory.com were redirected to UGNazi's cryptic website.

  Hacking Made Easy (Feb 2)
 

I am honoured to have been invited back to present at the prestigious e-Crime Congress to be held in London, March this year. However it caused a flash-back to the last occasion I presented at Congress in 2009, when things seemed to be very different.

  'Anonymous' hackers intercept conversation between FBI and Scotland Yard (Feb 3)
 

A member of the computer hacking group Anonymous has hacked into a telephone conference between the FBI and Scotland Yard and posted it on the internet.

  RFID Credit Cards Are Easy Prey for Hackers (Feb 2)
 

It's been known for some time that there are security issues associated with the increasing use of RFID tags in credit cards, but this past weekend afforded a fresh demonstration of just how easy it is for hackers to take advantage of them.

  Public Wi-Fi not as secure as you think (Feb 3)
 

In a world that is constantly connected, it seems these days you are never alone, whether you know it or not. "People are online around the clock," said computer expert Jake DeWoskin. DeWoskin is with the Twin Cities business consulting firm KDV.

  Mozilla closes critical holes in Firefox, Thunderbird and SeaMonkey (Feb 1)
 

Following the release of new versions of its open source Firefox web browser, Thunderbird email client and SeaMonkey suite, Mozilla has detailed the security fixes included in each of the updates. According to the project's Security Center page for Firefox, version 10.0 closes a total of 8 security holes in the browser, 5 of which are rated as "Critical" by Mozilla.

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Fixing OpenSSL's Heartbleed flaw will take MONTHS, warns Secunia
Even the most secure cloud storage may not be so secure, study finds
Targeted Attack Uses Heartbleed to Hijack VPN Sessions
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.