LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: October 24th, 2014
Linux Security Week: October 20th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Linux Security Week: May 20th, 2013 Print E-mail
User Rating:      How can I rate this item?
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Security Week Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.

LinuxSecurity.com Feature Extras:

Securing a Linux Web Server - With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise. While specific configurations vary wildly due to environments or specific use, there are various general steps that can be taken to insure basic security considerations are in place.

Password guessing with Medusa 2.0 - Medusa was created by the fine folks at foofus.net, in fact the much awaited Medusa 2.0 update was released in February of 2010. For a complete change log please visit http://www.foofus.net/jmk/medusa/changelog


  How a Career Con Man Led a Federal Sting That Cost Google $500 Million (May 15)
 

Whitaker began by explaining his business--how he started out selling HGH and steroids but eventually sent customers vegetable oil and protein powder instead. He also said that the Google employees he worked with knew that he was in Mexico, selling mainly to Americans in the US--and that they knew his business was illegal. Further, he stated, they helped him tailor his advertising to increase the number of clicks it received.

  Tough Times at Homeland Security (May 15)
 

A new wave of cyberattacks is hitting American companies at a particularly vulnerable time for the Department of Homeland Security, the federal agency charged with fending them off.

  Fake 'honeyword' passwords could be planted to trip up hackers (May 13)
 

A new security technique thwarts evildoers online not by hiding or encrypting your password, but by giving the hackers in question too many to choose from.

  Google's Cloud Drops Custom Linux For Debian (May 13)
 

Google has been using its own custom version of Linux, Google Compute Engine Linux, as it loads its customers' applications into its infrastructure as a service.

  Self-proclaimed LulzSec hacker fronts Sydney court (May 15)
 

A Sydney man arrested for allegedly defacing a local council website will face three charges when he fronts up to court in August.

  How to hack an electric car-charging station (May 17)
 

Is there anything more annoying than infrastructure that turns on you?

  Facebook ‘Capture the Flag' - Security Hacker Competition (May 14)
 

Facebook will host a Capture the Flag competition to find the next generation of cyber security experts.The competition includes a total prize fund of €3,500 available for first, second and third place winners.

  Fed offensive fueling hacker underground, report says (May 15)
 

The U.S. government is contributing to the Internet's underground economy by scooping up hacker tools to incorporate into offensive cyber weapons, a report from Reuters says.

  Transparency and Accountability (May 14)
 

As part of the fallout of the Boston bombings, we're probably going to get some new laws that give the FBI additional investigative powers. As with the Patriot Act after 9/11, the debate over whether these new laws are helpful will be minimal, but the effects on civil liberties could be large.

  How UNSW creates the world's best hackers (May 14)
 

The University of NSW is known for producing some of Australia's top lawyers, doctors and accountants. But the 64-year-old institution is now gaining a reputation for excelling in what is often viewed as anti-establishment – hacking.

  The US government might be the biggest hacker in the world (May 13)
 

The United States government is investing tens of millions of dollars each year on offensive hacking operations in order to exploit vulnerabilities in the computers of its adversaries, Reuters reports.

  LulzSec Hackers Sentenced In London (May 17)
 

LulzSec Hacker "Topiary" famously tweeted: "You cannot arrest an idea."Perhaps not, but in the case of Topiary, revealed to be Jake Davis, now 20, you can be sentenced to 24 months in a "young offenders institute" for two counts of conspiracy to impair the operation of a computer, to be followed by a five-year serious crime prevention order that can restrict where he can travel and which jobs he'll be allowed to take.

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Pro-Privacy Senator Wyden on Fighting the NSA From Inside the System
NIST to hypervisor admins: secure your systems
Quick PHP patch beats slow research reveal
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.