Security

ID theft, vulnerabilities, privacy issues, etc

Good Security Practices On Linux

Filed under
Security

ghabuntu.com: Some time ago, the open source world was caught by surprise by the announcement of a malware for Linux, hidden in a screensaver for Gnome in gnome.look.org. Security in Linux (as with any operating system) is a matter of habit, then we will list some tips.

Apache.org hit by targeted XSS attack, passwords compromised

Filed under
Software
Security
Web

blogs.zdnet.com: Combining a cross-site scripting (XSS) vulnerability with a TinyURL redirect, hackers successfully broke into the infrastructure for the open-source Apache Foundation in what is being described as a “direct, targeted attack.”

KDE KDM Vulnerability Elevation of Privilage

Filed under
KDE
Security

freetechie.com: Sebastian Krahmer from the SUSE Security team has found a vulnerability in KDM which will allow a local user to elevate their privileges to root access.

A word (or two) about Linux desktop security

Filed under
Linux
Security

cristalinux.blogspot: When I wrote my Windows 7 vs. Ubuntu 10.04 Beta ARTICLE several days ago, I rated Ubuntu higher than Windows in terms of security. In hindsight, I think I was perhaps assuming certain bits and pieces, as well as maybe not thoroughly explaining why I thought that was the case.

OS of the Future: Built for Security

Filed under
OS
Software
Security

eweek.com: Led, somewhat ironically, by Microsoft Windows, operating system vendors and some other software vendors have been making their products more secure by default. They also have been providing tools and best-practice guidelines for application developers to improve security.

Becoming a "Linux Security Artist"

Filed under
Security

linux.com: After forty years in the commercial computing business, the one idea that has been drilled into me by security professionals is the fact that there is no such thing as a secure computer system, only levels of insecurity.

Setting the record straight on sudo

Filed under
Software
Security

blogs.techrepublic.com: I recently read a blog posting that denounced the use of sudo as insecure. My first reaction was that the author had no idea how to use sudo properly or why you would want to.

System security? What about your DATA!

Filed under
Linux
Security

fewt.com: It is often said that Linux is more secure than Windows, and for enterprise workloads this tends to be very true. Desktop Linux is a completely different use case, and unfortunately security configuration is sadly way behind (read: non-existent).

Linux isn't invulnerable. Don't say it is.

Filed under
Linux
Security

thepcspy.com: Every month or so, I find some blog or forum post telling the world that because Linux is so hardcore, there's very little chance of it getting any malware. As you can probably tell from the title, I disagree and want these people to recognise why their arrogance is dangerous.

Do I need an anti-virus in Linux?

Filed under
Linux
Security

dedoimedo.com: And the simple answer is: no, you do not need an anti-virus in Linux. Yes, let me tell you a little secret. Come closer. That's it. You don't need an anti-virus in Windows, either! Boom! There you go.

Got Security? You're in Denial

Filed under
Security
  • Got Security? You're in Denial
  • Collection of security checks for Linux
  • Worst. Security Product. EVER!
  • Multi-user Security in Linux

Apache bug prompts update advice

Filed under
Software
Security
Web

zdnet.com.au: IT security company Sense of Security has discovered a serious bug in Apache's HTTP web server, which could allow a remote attacker to gain complete control of a database.

Be Afraid if Someone's Got a Voltmeter Hooked to Your CPU

Filed under
OSS
Security

ebb.org/bkuhn/blog: I had a hunch what was going on. I quickly downloaded a copy of the academic paper that was cited as the sole source for the story and read it. As I feared, OpenSSL was getting some bad press unfairly.

'Severe' OpenSSL vuln busts public key crypto

Filed under
Security

theregister.co.uk: Computer scientists say they've discovered a "severe vulnerability" in the world's most widely used software encryption package that allows them to retrieve a machine's secret cryptographic key.

The Perils of Sudo With User Passwords

Filed under
Security

longitudetech.com: The consensus among new Unix and Linux users seems to be that sudo is more secure than using the root account, because it requires you type your password to perform potentially harmful actions. In reality, a compromised user account, which is no big deal normally, is instantly root in most setups.

Chuck Norris is not a Linux virus

Filed under
Linux
Security

itworld.com: Get a grip people. A recent story about the so-called Chuck Norris botnet implies that it breaks Linux's security. Wrong.

LUKS mermaids of remote unlock

Filed under
Security

geekscrap.com: Recently, I’ve browsed several how-to’s regarding the possibility of unlocking a LUKS root volume remotely using an SSH connection. The problem with their approach is simple: they asked how to fix their setup, but forgot to ask what they’re trying to protect.

Quick and easy Linux security

Filed under
Linux
Security
HowTos

ghacks.net: You’ve just set up your Linux desktop. Naturally you want it to be as secure as possible. You’ve heard the rumors that, out of the box, Linux has outstanding security. Is it true? Do you really want to take a chance with that? Most likely not. But what can you do?

Tor Project servers hacked

Filed under
Security
Web

h-online.com: The Tor project developers have advised users to update their Tor anonymity software to version 0.2.1.22 or 0.2.2.7-alpha as soon as possible. This is because, in early January, two of the project's seven directory authorities (moria1 and gabelmoo) as well as the metrics.torproject.org statistics server were found to have been hacked.

How Travelers Can Protect Their Data

Filed under
Security

pthree.org: This post is not meant to be a sure method for defeating attackers. That you can make the process so tedious and time consuming for the attacker, that he will likely not bother and move to another victim. This post is about those methods.

Syndicate content