Linux Security Week: October 10th, 2011
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Security Week Thank you for reading the weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines. Feature Extras:

Free Online security course (LearnSIA) - A Call for Help - The Survivability and Information Assurance (SIA) course was originally developed by a team at Carnegie Mellon, led by Lawrence Rogers ( Back in 2010, I requested a license to continue the development of the course because it provides useful information on Information Assurance. Also, this course will always be freely available for anyone to use in the classroom or self-study. There are three parts to the LearnSIA curriculum.

What You Need to Know About Linux Rootkits - Rootkits are a way attackers hide their tracks and keep access to the machines they control. The good rootkits are very hard to detect and remove. They can be running on ones computer and no one can even know they have been running. Read more to learn how to detect them on your system.

  CSI:Internet (Oct 3)

It's one of those rare Saturday afternoons when the sun is actually shining. I'm just wondering how much meat to buy for the barbecue when my mobile rings. It's Hans he nervously confesses to me that he thinks he's caught himself a virus.

  How to lock down Linux (Oct 4)

Any operating system can be cracked if you don't adequately protect it. Yes, even Linux. Here are some security basics on how to protect your Linux systems.

  VPN Intranet Over the Internet: Understanding Multiprotocol Label Switching (Oct 4)

It's easy to set up a Virtual Private Network (VPN) for individuals. Trying to set up private networks over the public Internet for branch offices -- that's harder. To make VPNs work across multiple offices, you need to scale at an entirely different level to handle the traffic. That's where Multiprotocol Label Switching (MPLS) comes in.

  Hacker group Anonymous threatens to "erase" NYSE from Internet (Oct 5)

Notorious hacker group Anonymous has threatened to hack into the computer system of the New York Stock Exchange.

  The Air Force's secure Linux distribution (Oct 3)

Linux has long had a close, working relationship with governments, but Lightweight Portable Security (LPS) is the first official U.S. Linux distribution.

  Kernel Developers Share Security Tips (Oct 5)

As most folks know by now, a security breach affecting was discovered in September. While that didn't affect kernel sources, it did get Linux kernel developers to thinking about their personal system security--and it might not be a bad idea for others to do the same.

  Are you an IT security leader - really? (Oct 4)

An astonishing number of survey respondents believe they are IT security leaders. But what does it really take to be a leader, and how does your organization stack up? A surprisingly high--unreasonably high, in fact--number of organizations think their security program is part of the vanguard of risk management.

  Wi-Fi users not as safe as they think, survey says (Oct 6)

Among Wi-Fi users, there's a big gap between knowing about Wi-Fi security and keeping their network and devices secure, as revealed by the Wi-Fi Security Barometer Survey results that the Wi-Fi Alliance announced today.

  Technical IT Security Conference To Discuss Stuxnet Proliferation (Oct 3)

Stuxnet and SCADA security will be discussed at this year's Hacker Halted USA, October 25-27 in Miami, Florida. The premier east coast information security conference is devoting an entire track to SCADA and Critical Infrastructure threats and will provide presentations from leading industry experts and a panel discussion on Stuxnet proliferation moderated by The Washington Times security reporter Shaun Waterman. More information can be found at

  Steve Jobs And Tech Security (Oct 7)

The death of Steve Jobs is triggering not a little reflection over the impact that one man could have over the form and function of the technology we use every day. The Apple II and Apple Macintosh were systems on which many of today's technology professionals first cut their teeth. In more recent years, the iPod, iPhone, and iPad came to reshape or outright define our notions of what constituted an MP3 player, smartphone, or tablet.

  Lessons From the RSA Breach (Oct 5)

In the world of ICT security "the fundamental threat landscape has changed" -- again -- in the past 18 months, says Andy Solterbeck, Australia-NZ general manager for security specialist RSA.

  Apache hole allows attackers to access internal servers (Oct 6)

Security experts at Context have discovered a hole in the Apache web server that allows remote attackers to access internal servers. The mod_rewrite rewrite engine ensures that requests are distributed across different servers according to definable rules, for example, in order to balance loads or to separate dynamic and static content.

Only registered users can write comments.
Please login or register.

Powered by AkoComment!