LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: September 19th, 2014
Linux Security Week: September 15th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Linux Security Week: July 2nd, 2012 Print E-mail
User Rating:      How can I rate this item?
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Security Week Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.

LinuxSecurity.com Feature Extras:

Password guessing with Medusa 2.0 - Medusa was created by the fine folks at foofus.net, in fact the much awaited Medusa 2.0 update was released in February of 2010. For a complete change log please visit http://www.foofus.net/jmk/medusa/changelog

Password guessing as an attack vector - Using password guessing as an attack vector. Over the years we've been taught a strong password must be long and complex to be considered secure. Some of us have taken that notion to heart and always ensure our passwords are strong. But some don't give a second thought to the complexity or length of our password.


  Microsoft dangles $250k prize for hackers doing security research (Jun 25)
 

Microsoft has found a new way to deal with the increasingly complex issue of computer security: get hackers working for them.

  Two Members Of Hacker Group LulzSec Plead Guilty To Cyber Attacks (Jun 25)
 

Two British men accused of taking part in high-profile cyber attacks by hacking group LulzSec in 2011, have pleaded guilty to charges that include conspiring to attack Sony Pictures, FBI affiliate Atlanta Infragard and IT security company HBGary Federal.

  Canonical will use Intel's efilinux in Ubuntu for UEFI secure boot (Jun 27)
 

LINUX VENDOR Canonical will drop Grub 2 in favour of Intel's efilinux as its bootloader in order to comply with Microsoft's UEFI Secure Boot.

  Operation High Roller: online banking fraud on a grand scale (Jun 27)
 

McAfee has collaborated with security firm Guardian Analytics to uncover a ring of online banking criminals who specifically targeted corporate accounts with high balances. According to the two companies' white paper, the fraudsters have attempted to steal at least 60 million, more than L35 million of which was from the Netherlands banking system alone; L1 million involved German banking customers. The report doesn't provide any details on the actual financial damage caused.

  LulzSec Members Confess To DDoS Attacks (Jun 27)
 

Four alleged members of the LulzSec hacktivist group had their day in British court Monday. Two of the people charged--Ryan Cleary, 20, and Jake Leslie Davis, 19--appeared at Southwark Crown Court in England to enter guilty pleas against some of the charges against them, including hacking the public-facing websites of the CIA and Britain's Serious Organized Crime Agency (SOCA).

  How To Hire A Hacker (Jul 2)
 

They're the bane of the IT security professional's existence when they're on the wrong side of the law, but the truth is, hackers often understand the nuances of network security better than your average CSO. So is it safe to bring a hacker into your IT team?

  Hacker claims to have breached & backdoored antivirus software firm Trend Micro (Jul 2)
 

A hacker claims to have breached and backdoored security and antivirus software firm Trend Micro due to 'pseudo-security' as well as SYKES which runs support services for Trend Micro. According to Pastebin and a dump for 'proof' of the breach, the hacker claims to still be in control of a backdoor into the security firm.

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Encryption goof fixed in TorrentLocker file-locking malware
Qubes: The Open Source OS Built for Security
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.