LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: October 20th, 2014
Linux Advisory Watch: October 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Linux Security Week: May 1st, 2013 Print E-mail
User Rating:      How can I rate this item?
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Security Week Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.

LinuxSecurity.com Feature Extras:

Securing a Linux Web Server - With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise. While specific configurations vary wildly due to environments or specific use, there are various general steps that can be taken to insure basic security considerations are in place.

Password guessing with Medusa 2.0 - Medusa was created by the fine folks at foofus.net, in fact the much awaited Medusa 2.0 update was released in February of 2010. For a complete change log please visit http://www.foofus.net/jmk/medusa/changelog


  Twitter 2-Factor Authentication: What It Is and Why It Would Help National Security (Apr 26)
 

It can be said in the length of a single tweet: When a 140-character message can lead to national security issues, Twitter itself needs better security tools.

  "Forget passwords!": Google joins FIDO (Apr 26)
 

The FIDO Alliance, an organisation that aims to develop user-friendly password alternatives, has gainedPDF several new members and supporters this week. Google, NXP and CrucialTec have joined the Alliance's board of directors, taking seats alongside existing "Board Level" members.

  5 hot security defenses that don't deliver (Apr 25)
 

We'd all love to have a magic bullet to stop hackers, but these five defenses won't do the trick, despite what you've been told

  More malware discovered from drone cyberattacks (Apr 24)
 

Researchers following a cyberespionage campaign apparently bent on stealing drone-related technology secrets have found additional malware related to the targeted attacks.

  Six open source security myths debunked - and eight real challenges to consider (Apr 23)
 

Detractors of open source software often point to its broad developer base and open source code as a potential security risk. But that's not a fair assessment, according to Dr Ian Levy, technical director with the CESG, a department of the UK's GCHQ intelligence agency that advises UK government on IT security.

  Low-level clerk may be big-time hacker (Apr 25)
 

A COMPUTER help-desk clerk has been accused of manipulating confidential government data, amid revelations he is the self-confessed ringleader of shadowy hacking syndicate Lulzsec that previously undermined the CIA and FBI websites, federal police allege.

  Serial threat on the internet (Apr 25)
 

Security expert HD Moore warns of the existence of unprotected terminal servers on the internet. The researcher says that he found over 100,000 such systems during his analyses, and that more than 13,000 provided administrative access without requesting a password.

  Growing Number Of Attacks By China's Hacker Army (Apr 23)
 

Verizon's annual Data Breach Investigations Report, which will be released on Tuesday, found the number of attacks by state-affiliated actors had nearly tripled from last year and that 96 percent were attributed to China.

  Australian LulzSec hacker arrested (Apr 24)
 

Australian police have arrested IT security professional and self-proclaimed leader of an international hacking ring Matthew Flannery after he allegedly infiltrated a government website this month.

  The week in security: AFP arrests LulzSec hacker, security arresting BYOD planning (Apr 29)
 

Security researchers were surprised to discover that the malware baddies had gone to the unprecedented effort of creating an entirely new online advertisement distribution network, called BadNews, which burrowed its way through Google Play's security defences by laying dormant for weeks before distributing malware millions of times by sending fake update notifications.

  Suspect in 'biggest cyber attack in history' had hack van, bunker (Apr 29)
 

A Dutch citizen arrested in northeast Spain on suspicion of launching what is described as the biggest cyber attack in internet history operated from a bunker and had a van capable of hacking into networks anywhere in the country, officials said on Sunday.

  From hackers to security experts, the Balkan IT sector is booming (Apr 29)
 

After hacking the Pentagon, NASA and Britain's Royal Navy for fun, TinKode got a real job as a computer security expert for a Romanian cyber safety consultancy.

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Mobile Device Encryption Could Lead to a ‘Very, Very Dark Place’, FBI Director Says
What a hacker can learn about your life from the coffee shop’s Wi-Fi network
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.