Security

ID theft, vulnerabilities, privacy issues, etc

Patch issued for OpenOffice.org vulnerability

Filed under
Security

A patch has been widely released for a vulnerability in the OpenOffice.org productivity suite, a problem rated as "highly critical" by one security vendor.

Linux Kernel Various Vulnerabilities

Filed under
Security

Some vulnerabilities have been reported within the Linux kernel, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service).

Configuration: the forgotten side of security

Filed under
Security
HowTos

When the average computer user thinks about security, they usually think about reactive measures like anti-virus programs or security patches -- responses to a specific threat. A more efficient approach is to configure a system securely from the start.

Password Management Concerns with IE and Firefox

Filed under
Security

This two-part paper presents an analysis of the security mechanisms, risks, attacks, and defenses of the two most commonly used password management systems for web browsers, found in Internet Explorer and Firefox.

Linux Kernel Integer Overflow Vulnerability

Filed under
Security

Eugene Teo has reported a vulnerability in the Linux Kernel, which potentially can be exploited by malicious, local users to gain escalated privileges.

Ten people create 80 per cent of spam

Filed under
Security

TEN WELL AIMED silver bullets would take care of 80 per cent of the world's spam, according to the anti-spam organisation Spamhause. According to Security Pro News, Spamhause thinks that there are only ten people that are responsible for most of the spam in the world.

Denial of service attacks outlawed

Filed under
Security

A UK law has been passed that makes it an offence to launch denial of service attacks, which experts had previously called "a legal grey area."

Red Hat's Cox warns on open source security

Filed under
Security

Linux developer and Red Hat veteran Alan Cox urges caution to those who think Linux security is foolproof

Linux: NVIDIA Binary Graphics Driver Exploit

Filed under
Security

A recent security advisory announced today by Rapid7 explains, "the NVIDIA Binary Graphics Driver for Linux is vulnerable to a buffer overflow that allows an attacker to run arbitrary code as root.

Linux Kernel Denial of Service Vulnerabilities

Filed under
Security

Some vulnerabilities have been reported in the Linux 2.6 Kernel, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service).

Hackers claim zero-day flaw in Firefox

Filed under
Moz/FF
Security

The open-source Firefox Web browser is critically flawed in the way it handles JavaScript, two hackers said Saturday afternoon.

Securing Your Server With A Host-based Intrusion Detection System

Filed under
Linux
Security
HowTos

This article shows how to install and run OSSEC HIDS, an Open Source Host-based Intrusion Detection System. It performs log analysis, integrity checking, rootkit detection, time-based alerting and active response. It helps you detect attacks, software misuse, policy violations and other forms of inappropriate activities.

How To Combat Viruses Using Your Postfix Configuration

Filed under
Linux
Security
HowTos

In this guide you will learn how to tweak your Postfix/Amavisd setup to give better virus protection. If you want to achieve business grade virus protection you need to do a few small things so that there is less chance of the latest greatest script kiddie invention getting through. Therefore this tutorial shows how to install and use ClamAV, F-Prot, and McAfee UVScan.

Red Hat Champions Security Vulnerabilities Forum

Filed under
Security

Red Hat today announced its continuing commitment to superior security services with a new initiative, implemented by the National Institute of Standards and Technology (NIST), that enables members of the software industry to officially and publicly comment on vulnerabilities.

n/a

Reveal The Holes In Your Webserver

Filed under
Software
Security
Web

Nikto is an advanced web vulnerability scanner, which can help you expose the potential holes in your webserver (and thus allow you to fix them before malicious users attempt to exploit them). This guide will show you how to use its advanced scanning features to expose holes in your webserver which you never knew existed!

Disk Encryption Tools for Linux and benchmark results

Filed under
Security

Your computer running Linux somehow ran into a hardware glitch and had to be hauled to the neighborhood Computer service center. And you are asked to leave the machine at the service center and come back after a couple of days so that the technician can have a good look at it. But you are a bit worried because the harddisk contains the blue prints of the most secret project you are currently working on.

OpenOffice hits back at viral risk claims

Filed under
Security

OpenOffice.org has hit back at claims that the alternative office applications suite is riddled with security holes. Researchers at the French Ministry of Defense say that OpenOffice is subject to security weaknesses that make it at least as susceptible to computer viruses as the commercial, more widely used, Microsoft Office.

Researchers: OpenOffice.org Security 'Insufficient'

Filed under
Security

With Microsoft's Office suite now being targeted by hackers, researchers at the French Ministry of Defence say users of the OpenOffice.org software may be at even greater risk from computer viruses.

Defending Against New Rootkits That Beat BSD, Linux, Mac, Vista, AMD and Intel

Filed under
Security

“The idea behind Blue Pill is simple,” says Joanna Rutkowska of invisible things. “Your operating system swallows the Blue Pill and it awakes inside the Matrix.”

Syndicate content