This week, perhaps the most interesting articles include "," "Automated Detection for Patterns of Insecurities," and "DNS Attack Puts Web Security in Perspective."


Earn an NSA recognized IA Masters Online - The NSA has designated Norwich University a center of Academic Excellence in Information Security. Our program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Using interactive e-Learning technology, you can earn this esteemed degree, without disrupting your career or home life.


LinuxSecurity.com Feature Extras:

RFID with Bio-Smart Card in Linux - In this paper, we describe the integration of fingerprint template and RF smart card for clustered network, which is designed on Linux platform and Open source technology to obtain biometrics security. Combination of smart card and biometrics has achieved in two step authentication where smart card authentication is based on a Personal Identification Number (PIN) and the card holder is authenticated using the biometrics template stored in the smart card that is based on the fingerprint verification. The fingerprint verification has to be executed on central host server for security purposes. Protocol designed allows controlling entire parameters of smart security controller like PIN options, Reader delay, real-time clock, alarm option and cardholder access conditions.

pgp Key Signing Observations: Overlooked Social and Technical Considerations - While there are several sources of technical information on using pgp in general, and key signing in particular, this article emphasizes social aspects of key signing that are too often ignored, misleading or incorrect in the technical literature. There are also technical issues pointed out where I believe other documentation to be lacking. It is important to acknowledge and address social aspects in a system such as pgp, because the weakest link in the system is the human that is using it. The algorithms, protocols and applications used as part of a pgp system are relatively difficult to compromise or 'break', but the human user can often be easily fooled. Since the human is the weak link in this chain, attention must be paid to actions and decisions of that human; users must be aware of the pitfalls and know how to avoid them.

Bulletproof Virus Protection - Protect your network from costly security breaches with Guardian Digital’s multi-faceted security applications. More then just an email firewall, on demand and scheduled scanning detects and disinfects viruses found on the network. Click to find out more!

Take advantage of our Linux Security discussion list! This mailing list is for general security-related questions and comments. To subscribe send an e-mail to This email address is being protected from spambots. You need JavaScript enabled to view it. with "subscribe" as the subject.

Earn an NSA recognized IA Masters Online - The NSA has designated Norwich University a center of Academic Excellence in Information Security. Our program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Using interactive e-Learning technology, you can earn this esteemed degree, without disrupting your career or home life.

Security on your mind?

Protect your home and business networks with the free, community version of EnGarde Secure Linux. Don't rely only on a firewall to protect your network, because firewalls can be bypassed. EnGarde Secure Linux is a security-focused Linux distribution made to protect your users and their data.

Guardian Digital Makes Email Safe For Business - Microsoft 365, Goo....

Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headline.


Study: Encryption Is Needed; Few Doing It
14th, February, 2007

While 66% of IT and business managers surveyed have "some type" of encryption strategy, only 16% have enterprise-wide strategies, the Ponemon Institute found. While IT and business managers say they know encryption is critical to safeguarding company information on laptops, not many are actually doing it.

news/cryptography/study-encryption-is-needed-few-doing-it
Sun Focuses on Security in New Storage Ware
14th, February, 2007

The StorageTek Crypto-Ready T10000 drive supports multiple operating systems, including the Solaris OS, Z/OS and Windows. It enables customers to encrypt data using the AES-256 encryption algorithm as it is written to the drive, regardless of the application, operating platform or primary storage device and without impacting backup or restore times.

news/cryptography/sun-focuses-on-security-in-new-storage-ware
Cryptophone G10i Encrypts Phone Calls
15th, February, 2007

Need absolute privacy on your cell phone calls? Try the Cryptophone. The Cryptophone is a joint venture between Taiwanese smartphone maker HTC, and GSMK of Germany. The Cryptophone is a pretty normal clamshell phone with special software that encrypts your calls with "special software that encrypts calls with 4096 bit Diffie-Hellman key exchange and SHA256 hash function AES 256 and Twofish between Cryptophones."

news/cryptography/cryptophone-g10i-encrypts-phone-calls
Top Five Web Application Vulnerabilities
14th, February, 2007

PHP version 5.2.0 and prior is susceptible to multiple security vulnerabilities. If exploited, these vulnerabilities could give an attacker the means to execute arbitrary code, write files in unauthorized locations, or create a denial-of-service condition. An upgrade which resolves these issues has been released. Contact the vendor for additional information.

IT Faces Networks Without Borders
12th, February, 2007

As end users at different companies conduct more business with one another via the Web, corporate information security strategies are being turned inside out literally. Corporate security managers have spent many years and tens of billions of dollars erecting sophisticated defenses designed to keep intruders out of their networks. But they