Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.

LinuxSecurity.com Feature Extras:

What You Need to Know About Linux Rootkits - Rootkits are a way attackers hide their tracks and keep access to the machines they control. The good rootkits are very hard to detect and remove. They can be running on ones computer and no one can even know they have been running. Read more to learn how to detect them on your system.

Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition - Mark Sobell again delivers the answers to common Linux administration challenges, and provides thorough and step-by-step instructions to configuring many of the common Linux Internet services in A Practical Guide to Fedora and Red Hat Enterprise Linux, Fifth Edition.


10 Linux Server Distros That Could Save You a Bundle (Aug 15)

Businesses require reliability, stability and compatibility. It's no wonder business owners prefer to stick with the status quo: It's what works for them. Those entrepreneurs who take the time to research the possibilities outside that status quo find a treasure trove of free and low-cost alternatives. When it comes to software, Linux is at the top of that list. With more than 100 complete distributions from which to choose, Linux is far from a single entity.

Kevin Mitnick, Former Fugitive Hacker, Laments How The Game Has Changed (Aug 17)

By 1992, federal agents were closing in on Kevin Mitnick, the FBI's most-wanted hacker. But he already knew this; he was watching them.

(Aug 17)

If you're a hacker, you can't trust anyone. Even the fellow gamers in an Xbox forum. That's how an 18-year-old leader of the notorious hacking group Lulz Security got tripped up, according to one of his comrades.

Firefox 6.0 adds clutch of useful security tweaks (Aug 16)

The latest accelerated release for Firefox, version 6.0, arrives this week but what can users expect in advance of the more significant changes promised for version 7.0 later this year? The answer for now is better security.

(Aug 17)

Hackers are using botnets to generate more than 80,000 search queries a day, allowing them to identify potential attack targets in a very short time and with minimal effort.

Hackers bypass Google security for cyber reconnaissance (Aug 17)

Imperva's hacker intelligence initiative yesterday revealed that hackers are now using search engines to facilitate thousands of risk-free attacks.

Lessons learned from a recent Amazon outage (Aug 16)

Another Amazon cloud-services outage occurred on Sunday, August 7th in a Dublin, Ireland data center. This one occurred due to a lightning strike that hit a transformer near the Dublin data center. It led to an explosion and fire that knocked out all utility services thereby leading to a total data center outage. Amazon had its only European data center located there.

(Aug 16)

A mobile security expert says he has found new ways for hackers to attack phones running Google Inc's Android operating system.

First dent in the AES crypto algorithm (Aug 19)

A team of researchers has discovered a first vulnerability in the AES encryption standard that shortens the algorithm's effective key length by two bits. This means that the usual key lengths of 128, 192 and 256 bits are reduced to 126, 190 and 254 bits.

(Aug 15)

Whether you use WordPress for your personal blog, or your organization uses it for its entire Web site, ensuring its security is a good thing. One tool that can help secure WordPress is the the Exploit Scanner plugin.

(Aug 15)

Researchers at U.C. Berkeley have discovered that some of the net's most popular sites are using a tracking service that can't be evaded -- even when users block cookies, turn off storage in Flash, or use browsers' "incognito" functions.

Beware of rising phone hacking incidents (Aug 19)

Phone hacking incidents are on the rise and users need to take measures to prevent their phone conversations from being breached, warn industry watchers who say hackers today deploy various tactics to intercept conversations on landline as well as mobile phones.