Coverity, Inc., makers of the world’s most advanced and scalable source code analysis solution, today announced that as a result of their contract with US Department of Homeland Security (DHS), the biggest X Window System security vulnerability of the last six years was identified and fixed.
Marcel Holtmann has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. The vulnerability has been reported in versions prior to 22.214.171.124.
The government announced yesterday (Wednesday) that it is testing a security architecture intended to bolster protection of public sector IT systems from hackers and security breaches.
Not everyone has "l33t skilz" or mass amounts of hardened TCP/IP stack programming experience. When I'm at work, I don't look at logs all day long, nor do I run security audits every five minutes. I do my job, which takes all of my time. This is the situation for most small to medium sized companies that have only a few IT guys. So how does an everyday IT guy handle the constant threat of impending attack?
How do I scan my Linux system for rootkits, worms, trojans, etc.?
Either with ckrootkit or with rkhunter.
MORE attacks were directed at Linux systems in the Philippines during the first quarter of 2006, a report from a local security research group revealed.
The results of a Homeland Security Department-funded bug hunt spanning 40 popular open-source programs has thus far met ambivalence from the open-source community. While many projects are using the results to improve their software, others are bemoaning the high number of false positives.
Rootkits are becoming more prevalent and difficult to detect, and security vendor McAfee says the blame falls squarely on the open source community.
Kaspersky Lab today reported a new proof-of-concept (PoC) cross-platform virus that creates malicious code to infect both Linux and Microsoft Windows operating systems.
The Electronic Frontier Foundation (EFF) on Wednesday filed the legal briefs and evidence supporting its motion for a preliminary injunction in its class-action lawsuit against AT&T. The evidence that we are filing supports our claim that AT&T is diverting Internet traffic into the hands of the NSA wholesale, in violation of federal wiretapping laws and the Fourth Amendment.
A vulnerability has been reported in Linux Kernel 2.6.x, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
The new 126.96.36.199 Linux kernel point release follows the 2.6.16 release by a week and includes various bug fixes, as well as a fix for a potential security vulnerability.
RealNetworks on Wednesday disclosed four critical bugs in a large number of its media products, then rolled out new, patched versions for Windows, Mac OS X, and Linux.
A serious flaw exists in certain versions of the popular Sendmail open-source and commercial e-mail software, but fixes are available, researchers said Wednesday.
Two vulnerabilities have been identified in Linux Kernel, which could be exploited by attackers to execute arbitrary commands or cause a denial of service in Kernel versions prior to 2.6.16.
A shattering new form of the "denial-of-service" computer attack could be on the rise, according to a company that controls some of the internet's core infrastructure.