LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: November 28th, 2014
Linux Advisory Watch: November 21st, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Linux Security Week: November 19th, 2012 Print E-mail
User Rating:      How can I rate this item?
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Security Week Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.

LinuxSecurity.com Feature Extras:

Password guessing with Medusa 2.0 - Medusa was created by the fine folks at foofus.net, in fact the much awaited Medusa 2.0 update was released in February of 2010. For a complete change log please visit http://www.foofus.net/jmk/medusa/changelog

Password guessing as an attack vector - Using password guessing as an attack vector. Over the years we've been taught a strong password must be long and complex to be considered secure. Some of us have taken that notion to heart and always ensure our passwords are strong. But some don't give a second thought to the complexity or length of our password.


  How to devise passwords that drive hackers away (Nov 12)
 

Not long after I began writing about cybersecurity, I became a paranoid caricature of my former self. It's hard to maintain peace of mind when hackers remind me every day, all day, just how easy it is to steal my personal data.

  Encryption, not restriction, is the key to safe cloud computing (Nov 12)
 

It's 11 p.m. Do you know where your data is? If your enterprise has transitioned to the cloud for data storage the answer almost certainly is "no." Portions of it might be in Malaysia; other bits in Antigua.

  Scotty beams data past firewalls and filters (Nov 14)
 

Two developers from Germany have releasedGerman language link Scotty, a lightweight open source web proxy that allows users to bypass content filtering by establishing a secure connection to the internet. The application is named after the fictional engineer from Star Trek because, according to the developers, it "beams data to your computer, no matter where you are".

  Security Metrics: Critical Issues (Nov 12)
 

Numbers are the language of business. Fortunately, security metrics are growing ever more sophisticated. Knowing what to measure, how to measure it and how to communicate those metrics can help improve security's efficiency, effectiveness and standing in the business world.

  Origin Hacked, EA's Own Security Measures Used (Nov 14)
 

Are you one of the millions using EA's Origin digital platform service? If so, you might want to read what happened to these people so it doesn't happen to you/

  Teenage Hacker Cosmo the God' Sentenced by California Court (Nov 12)
 

The 15-year-old UG Nazi hacker known as Cosmo* or Cosmo the God was sentenced in juvenile court on Wednesday in Long Beach, California. According to Cosmo, he pleaded guilty to multiple felonies in exchange for a probation, encompassing all the charges brought against him, which included charges based on credit card fraud, identity theft, bomb threats, and online impersonation.

  Ruby update fixes hash flooding vulnerability (Nov 12)
 

The Ruby developers have released an update to the 1.9.3 series of their open source programming language, fixing a denial-of-service vulnerability. Ruby 1.9.3 patch level 327, labelled 1.9.3-p327, corrects a hash-flooding issue that could be exploited by an attacker to cause a high CPU load that can result in a denial-of-service.

  Hacker Claims to Have Breached Adobe (Nov 14)
 

Password security is only as good as the weakest link. And on Wednesday, that weak link appeared to be Adobe Systems.

  Majority of popular EU websites don't ask permission to install cookies (Nov 16)
 

A majority of European Internet users expect companies to ask for permission to track their activities online using cookies, privacy management company Truste said Thursday. But despite the 2009 introduction of the European Union's so-called cookie directive requiring just that, only a small minority of websites ask for visitors' consent, according to a survey by the company.

  Skype for Linux 4.1 arrives with Microsoft account support (Nov 16)
 

Microsoft's Skype division has released version 4.1 of its popular closed source VoIP, video and text chat software for Linux. The latest release of the software, labelled 4.1.0.20, is a major update to the 4.x branch and brings with it enhancements to the application's user interface and several new features, such as support for signing into Microsoft accounts.

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.