linuxadvocates.com: It's more than a bit worrisome not just for Amazon Web Services, but other Cloud ISPs as well as their customers who need to come to terms with the legality of what the disclosure of the NSA PRISM surveillance program means in pure risk management terms.
softpedia.com: The National Security Agency or NSA is now in the public eye for some nefarious surveillance, but Linux users should know that the agency also had an active role the Linux kernel development, with the addition of SELinux.
- Mozilla launches massive campaign on digital surveillance
- Got a PRISM and Boundless Informant problem? Whisper and Tor can help
- Berlin rejects open source plan, looks to open standards instead
- TuxRadar Open Ballot: Big Brother
worldofgnome.org: For Free Software fans, malware is considered any non-open source software, like your nVidia or Catalyst proprietary drivers. So for this post I tried Avira Antivirus which isn’t free, to fight the fire with fire, or in my case to fight a malware with a malware
arstechnica.com: A month after critical bug was quietly fixed, "root" vulnerability persists.
h-online.com: Coverity has called Linux the "benchmark of quality" in its newly published 2012 Coverity Scan Open Source report. Linux 3.8's 7.6 million lines of code has a defect density of .59.
itworld.com: Security vendors analyzing the code used in the cyberattacks against South Korea are finding nasty components designed to wreck infected computers. Tucked inside a piece of Windows malware used in the attacks is a component that erases Linux machines.
thevarguy.com: Open source fans like to brag that Linux needs no antivirus software. Yet as executives at security vendor ESET were keen to remind me in a recent interview, that truism holds true only to a certain extent.
itwire.com: Researchers at Sourcefire have analysed 25 years of vulnerabilities that were reported to CVE and NVD databases and found some interesting results.
What's the best way to secure an enterprise network, including both communications and data? No single solution fits all situations, but the practices outlined here mark a solid starting point on which IT departments can build.
dontsurfinthenude.blogspot: You don't need an anti-virus program on Linux: I've said it before, but Don't Surf in the Nude started because of an interest in internet security, so I can't resist trying out anti-virus programs in Linux.
techworld.com: Security researchers have discovered what appears to be an experimental Linux rootkit designed to infect its highly select victims during a classic drive-by website attack.
hothardware.com: There seems to be a recurring phenomenon in the technology press, where any trojan that affects Linux or Macs becomes front page news. On the other hand, trojans that affect Windows are mostly ignored.
theregister.co.uk: Security researchers have discovered a potential dangerous Linux and Mac OS X cross-platform trojan.
pcworld.com: The Adobe fix aims to cure an "object confusion vulnerability" discovered in all versions of the player -- Windows, Macintosh, Linux, and Android -- but thus far has only been used to attack Windows systems using Microsoft's browser software.
theregister.co.uk: A student has discovered a critical vulnerability in BackTrack, a flavour of Linux that's a favourite among security pros.
pcworld.com: Given the vast numbers of Macs that are apparently infected with the Flashback Trojan malware, it's not at all surprising to see that sales of Mac security software are now skyrocketing.
zdnet.com.au: Patches have been released for file-networking protocol software, Samba, revealing that the software, which is used extensively in Macs and Linux, has been subject to a critical vulnerability for almost a decade.
linuxinsider.com: In the meantime, another compelling conversation has been raging for some time now, and Linux Girl would be remiss not to cover it, because it's an important topic. Privacy, that is -- and the costs that go along with it.
phoronix.com: Just about 24 hours ago I spread the news about a major vulnerability in X.Org / XKB that makes it trivial for anyone with physical access to a Linux-based desktop system to easily bypass any screensaver lock whether you're using GNOME, KDE, or most other desktop environments. So what's changed in the past day?