This week, perhaps the most interesting articles include "Why Your Web Apps are Sitting Ducks," "Database Security Undermined By Protocol Loopholes," and "Rootkits Can Evade Hardware Detection."


Earn an NSA recognized IA Masters Online - The NSA has designated Norwich University a center of Academic Excellence in Information Security. Our program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Using interactive e-Learning technology, you can earn this esteemed degree, without disrupting your career or home life.


LinuxSecurity.com Feature Extras:

RFID with Bio-Smart Card in Linux - In this paper, we describe the integration of fingerprint template and RF smart card for clustered network, which is designed on Linux platform and Open source technology to obtain biometrics security. Combination of smart card and biometrics has achieved in two step authentication where smart card authentication is based on a Personal Identification Number (PIN) and the card holder is authenticated using the biometrics template stored in the smart card that is based on the fingerprint verification. The fingerprint verification has to be executed on central host server for security purposes. Protocol designed allows controlling entire parameters of smart security controller like PIN options, Reader delay, real-time clock, alarm option and cardholder access conditions.

pgp Key Signing Observations: Overlooked Social and Technical Considerations - While there are several sources of technical information on using pgp in general, and key signing in particular, this article emphasizes social aspects of key signing that are too often ignored, misleading or incorrect in the technical literature. There are also technical issues pointed out where I believe other documentation to be lacking. It is important to acknowledge and address social aspects in a system such as pgp, because the weakest link in the system is the human that is using it. The algorithms, protocols and applications used as part of a pgp system are relatively difficult to compromise or 'break', but the human user can often be easily fooled. Since the human is the weak link in this chain, attention must be paid to actions and decisions of that human; users must be aware of the pitfalls and know how to avoid them.

Bulletproof Virus Protection - Protect your network from costly security breaches with Guardian Digital’s multi-faceted security applications. More then just an email firewall, on demand and scheduled scanning detects and disinfects viruses found on the network. Click to find out more!

Take advantage of our Linux Security discussion list! This mailing list is for general security-related questions and comments. To subscribe send an e-mail to This email address is being protected from spambots. You need JavaScript enabled to view it. with "subscribe" as the subject.

Earn an NSA recognized IA Masters Online - The NSA has designated Norwich University a center of Academic Excellence in Information Security. Our program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Using interactive e-Learning technology, you can earn this esteemed degree, without disrupting your career or home life.

Security on your mind?

Protect your home and business networks with the free, community version of EnGarde Secure Linux. Don't rely only on a firewall to protect your network, because firewalls can be bypassed. EnGarde Secure Linux is a security-focused Linux distribution made to protect your users and their data.

Guardian Digital Makes Email Safe For Business - Microsoft 365, Goo....

Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headline.


EnGarde Secure Community 3.0.13 Released
6th, March, 2007

Guardian Digital is happy to announce the release of EnGarde Secure Community 3.0.13 (Version 3.0, Release 13). This release includes many updated packages and bug fixes, some feature enhancements to Guardian Digital WebTool and the EnGarde Secure Linux Installer, and a few new features.

Why Your Web Apps are Sitting Ducks
3rd, March, 2007

Despite improvements in code quality, Web servers remain at high risk of being hacked, according to a new paper from researchers who use honeypot technologies to examine how hackers tick.

The Honeynet Project, which provides real systems for unwitting attackers to interact with, says Web applications remain vulnerable for host of reasons. These include poor-quality code, the fact that attacks can be performed using PHP and shell scripts (which is generally easier than using buffer-overflow exploits), and the emergence of search engines as hacking tools.

news/network-security/why-your-web-apps-are-sitting-ducks
Single Packet Authorization
6th, March, 2007

Countless pieces of software, protocols and complex interdependencies together form a system for which it is difficult to guarantee any particular property-particularly security. Even software specifically designed to enhance security can, at the behest of clever individuals armed with detailed knowledge, work to its detriment. Vulnerabilities have been discovered in all sorts of security software from firewalls to implementations of the Secure Shell (SSH) Protocol. For example, OpenSSH is developed by some of the most security-conscious developers in the world, and yet it occasionally contains a remotely exploitable vulnerability. This is an important fact to note because it seems to indicate that security is hard to achieve and, therefore, bolsters the case for a defense-in-depth approach. This article explores the concept of Single Packet Authorization (SPA) as a next-generation passive authentication technology beyond port knocking.

news/network-security/single-packet-authorization
How Dangerous Is Skype?
6th, March, 2007

There's been a lot information -- and misinformation -- available about whether Skype is dangerous to corporate networks and individual users. How dangerous is it? In this article, I'll separate the truth from the myths when it comes to Skype vulnerabilities.

news/network-security/how-dangerous-is-skype
sshguard: Protection for OpenSSH
6th, March, 2007

Are you concerned about brute force dictionary attacks on SSH? Given the popularity of these attacks, you should be. sshguard is a new tool to help protect against such attacks. Although it is still in beta stage, it appears to work well.

news/network-security/sshguard-protection-for-openssh
IRC Bot a Growing Threat To Enterprise Networks
7th, March, 2007

A new internet relay chat (IRC) bot is building an even larger zombie family that could pose a significant threat to enterprise networks, security researchers said today.

news/network-security/irc-bot-a-growing-threat-to-enterprise-networks
SMEs Wary of Online Backup Due to Security
8th, March, 2007

The number one concern for small to medium-sized enterprises (SMEs) considering online backup is security and as a result less than 10pc of Irish SMEs are planning to invest in online backup in 2007, broadband player Magnet said today quoting research from iReach.

news/network-security/smes-wary-of-online-backup-due-to-security
Database Security Undermined By Protocol Loopholes
6th, March, 2007

A security expert is warning database administrators about a continued loophole in database communication protocols that would allow an attacker to bypass access controls and gain access to critical files.

news/server-security/database-security-undermined-by-protocol-loopholes
BackTrack2 Final Now Available
7th, March, 2007

Remote-Exploit has announced the release of BackTrack 2.0, SLAX-based live CD with a comprehensive collection of security and forensics tools: After many months of work, we're finally happy enough with BackTrack to call it v.2.0 Final.

news/vendors-products/backtrack2-final-now-available
Startup Launches Breakout Testing Tool
7th, March, 2007

Renowned researcher HD Moore and startup BreakingPoint Systems's "baby" has finally arrived -- the company is launching its new all-in-one network and security testing appliance that Moore helped build.

news/security-projects/startup-launches-breakout-testing-tool
Biometrics Overview
5th, March, 2007

Identification and verification have long been accomplished by showing something you have, such as a licence or a passport. Sometimes it also required something you know, such as a password or a PIN. As we move into a time when we need more secure and accurate measures, we begin to look at using something you are: biometrics.

Targeted Malware Rises Once Again
5th, March, 2007

The number of new malicious programs in 2006 rose by 41 per cent on the previous year