Short bio: Computer Scientist, FOSS supporter (read more)
Tux Machines (TM)-specific
h-online.com: The recent Kernel Summit, LinuxCon Europe and Realtime Workshop events revealed lots of interesting developments from the kernel scene, including a few details of the hack at kernel.org.
datamation.com: For years, one of the biggest benefits of escaping Microsoft Windows was that running a security suite with a Linux distribution was completely unnecessary. There simply wasn't a need for it.
winehq.org: I am sad to say that there was a compromise of the WineHQ database system.
lwn.net: Of the 171 trees that represent work for the next merge window, 89 only exist on kernel.org machines. This means (obviously) that I have not had updates to those 89 trees since the kernel.org servers were taken down.
pcworld.com: The website for the open-source MySQL database was hacked and used to serve malware to visitors Monday.
Also: MySQL at the core of commercial open source
mrpogson.com: A recent bug reported in Ubuntu GNU/Linux is that apt-key fails to properly check the package-signing keys downloaded from an Ubuntu repository. Debian has the same faulty code but thankfully it is disabled.
zdnet.com.au: The Linux Foundation has pulled its sites offline due to a security breach that occurred on 8 September, which it believes was in connection with an attack on kernel.org.
itwire.com: Seventeen days. That how long it took for the elite administrators at the Linux kernel project to find out that servers at the project had been breached.
readwriteweb.com: The site that hosts the Linux kernel's source code, Kernel.org was compromised earlier this month. The discovery was made on August 28th, and steps are being taken now to enhance security for the site and recovery is underway.
Also: The Cracking of Kernel.org by Jon Corbet
zdnet.com: According to an Ubuntu security alert, the WebKit flaws are dangerous enough to cause arbitrary code execution attacks.
Truecrypt, is a free and open-source disk encryption software. In this post we will show you how to encrypt all your data using Truecrypt in 11 easy steps. With Truecrypt it is possible to encrypt a virtual disk (folder), a partition or a whole storage device. The two most beautiful things with Truecrypt are real-time instantaneous encryption and simple and easy setup.
drbill.cc: I love VLC. It is one of the programs I install on all my systems, whether Windows, or Linux. BUT, some evil, nasty dewds are making the good name of VLC a “hook” to get you to download a modified mailware infested version! Grrrr!
junauza.com: Hackers and hacker groups were quite famous in the 80’s and 90’s but their popularity started fading since the Y2K days. Today, we are once again witnessing hackers threatening to take on giant corporations sending chills down everyone's spine.
mrpogson.com: I was surprised to see Brazil in the list of systems compromised by “Anonymous” recently. To demonstrate the compromise, /etc/passwd from some systems was published.