Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.

LinuxSecurity.com Feature Extras:

Peter Smith Releases Linux Network Security Online - Thanks so much to Peter Smith for announcing on linuxsecurity.com the release of his Linux Network Security book available free online. "In 2005 I wrote a book on Linux security. 8 years later and the publisher has gone out of business. Now that I'm free from restrictions on reproducing material from the book, I have decided to make the entire book available online."

Securing a Linux Web Server - With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise. While specific configurations vary wildly due to environments or specific use, there are various general steps that can be taken to insure basic security considerations are in place.


  (Dec 16)
 

A grinch may be snatching away some year-end holiday time, forcing Linux system administrators to fill a gaping security hole in their systems.

  Segmenting for security: Five steps to protect your network (Dec 18)
 

Relying on a DMZ to protect your network and data is like putting money in a bank that depends on one guard and a single gate to secure its deposits. Imagine how tempting all those piles of money would be to those who had access -- and how keen everyone else would be to obtain access.

  Exploiting MS14-068 - just another pentest (Dec 15)
 

This is a short post on how to exploit MS14-068 on Linux. This came up on my recent internal infrastructure engagement. The primary DC was a vulnerable Windows 2008 R2 SP1 server.

  New England security group shares threat intelligence, strives to bolster region (Dec 17)
 

The Advanced Cyber Security Center is a three year old organization with a bold mission to "bring together industry, university, and government organizations to address the most advanced cyber threats" and drive cybersecurity R&D in the New England region.

  (Dec 18)
 

Setting up encryption on your wireless router is one of the most important things you can do for your network security, but your router probably offers various different options--WPA2-PSK (TKIP), WPA2-PSK (AES), and WPA2-PSK (TKIP/AES) among the alphabet soup. How-To Geek explains which one to choose for a faster, more secure home network.

  Next gen ransomware: Elliptic cryptic, talks on Tor, demands Bitcoin (Dec 15)
 

Cybercrooks have brewed a strain of ransomware that uses elliptic curve cryptography for file encryption, and Tor for communication.The malware, dubbed OphionLocker, is spreading using a malicious advertising (malvertising) campaign featuring the RIG exploit kit.

  Heartbleed, Shellshock, Tor and more: The 13 biggest security stories of 2014 (Dec 19)
 

Epic hacks, major vulnerabilities, and other security surprises rolled across the Internet like a tidal wave in 2014. We thought we'd seen it all after an SSL vulnerability pierced the heart of the Internet and the crypto world lost a major asset. But then Sony (once again) fell prey to one of the most devastating cyberattacks ever.

  (Dec 17)
 

A 17 year-old Londoner has pleaded guilty to a series of denial-of-service attacks against internet exchanges and the Spamhaus anti-spam service last year.

  OphionLocker, A New Ransomware uses Elliptic Curve for Encryption (Dec 16)
 

A new variety of Ransomware has been discovered by Trojan7Malware researchers. Dubbed as OphionLocker, this Ransomware is very unique in the sense that it uses elliptic curve cryptography for file encryption, and Tor for communication. Another unique signature of OphionLocker is that it uses malvertising campaigns to propagate itself rather then traditional spear phishing methods.

  Sony hackers release more data, promise