LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: November 21st, 2014
Linux Security Week: November 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Linux Security Week: March 26th, 2012 Print E-mail
User Rating:      How can I rate this item?
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Security Week Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.

LinuxSecurity.com Feature Extras:

Password guessing with Medusa 2.0 - Medusa was created by the fine folks at foofus.net, in fact the much awaited Medusa 2.0 update was released in February of 2010. For a complete change log please visit http://www.foofus.net/jmk/medusa/changelog

Password guessing as an attack vector - Using password guessing as an attack vector. Over the years we've been taught a strong password must be long and complex to be considered secure. Some of us have taken that notion to heart and always ensure our passwords are strong. But some don't give a second thought to the complexity or length of our password.


  New iPad jailbroken just hours after release (Mar 19)
 

While you were waiting in line for the new iPad on Friday, or avoiding the mad-dash-gadget-grab altogether, hackers had already found several ways to jailbreak the coveted Apple device.

  Chinese hack Microsoft (Mar 20)
 

Chinese hackers apparently have gained access to Microsoft problem details even before a company patch was released and security researchers are worried the leak came directly from Microsoft's secured website.

  How to hack someone's computer (Mar 22)
 

As the digital world becomes more and more complex, the need for deliberate, thorough security grows. Yes, we know, you've got everything "password protected." And yes, not every hacker is like the guys in the movies who are able to keyboard their way through complicated layers of encrypted, password-protected security faster than a gamer boots up a new version of Call of Duty.

  How To Secure DNS with DNSCrypt (Mar 20)
 

This open-source software for Mac and Linux does for DNS what SSL does for HTTP: It encrypts DNS traffic to prevent spoofing, snooping, and man-in-the-middle attacks.

  Stolen encryption key the source of compromised certificate problem (Mar 19)
 

When Kaspersky Lab last week spotted code-signed Trojan malware dubbed Mediyes that had been signed with a digital certificate owned by Swiss firm Conpavi AG and issued by Symantec, it touched off a hunt to determine the source of the problem.

  Microsoft proof of concept exploit ends up in hacker hands (Mar 22)
 

The world of online security is frenetically paced, with a constant, ongoing battle between software companies and hackers.

  WikiLeaks Founder to Run for Australian Senate (Mar 19)
 

WikiLeaks founder Julian Assange, a thorn in the side of the U.S. government thanks to his posting of classified information, will run for a seat in the Australian Senate in spite of being held in the United Kingdom on house arrest. His organization posted the development on Twitter.

  Worry About the Hackers You Don't See (Mar 22)
 

No one who has seen it forgets the "Twilight Zone" episode about a town in Ohio that lives in terror of a 6-year-old born with godlike powers. One man who opposes the boy finds himself turned into a jack-in-a-box for thinking "bad thoughts." If the "hacktivist" collective known as Anonymous has something in common with a willful, dangerous child, then Aaron Barr is the adult who got in trouble for thinking bad thoughts.

  Activists 'commit more data breaches than cybercriminals' (Mar 23)
 

Activists such as "Anonymous" who hack into government and corporate computer networks and then release files to embarrass those organisations were responsible for more than half of all known data thefts last year, according to a new survey.

  IBM Says Security Threats Mount Despite More Awareness (Mar 22)
 

Nick Bradley, senior manager for IBM (NYSE: IBM) global security operations, said despite more awareness, computer center managers need to be vigilant against cyberattacks.

  The Zero-Day Salesmen (Mar 23)
 

At a Google-Run competition in Vancouver last month the search giant's famously secure Chrome Web browser fell to hackers twice. Both of the new methods used a rigged ­website to bypass Chrome's security protections and completely hijack a target computer.

  Meet The Hackers Who Sell Spies The Tools To Crack Your PC (Mar 26)
 

At a Google-run competition in ­Vancouver last month, the search giant's famously secure Chrome Web browser fell to hackers twice. Both of the new methods used a rigged ­website to bypass Chrome's security protections and completely hijack a target computer.

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.