linuxjournal.com: It was just last week that Theo de Raadt, OpenBSD founder and developer, posted an email that claimed the Federal Bureau of Investigations paid OpenBSD developers to leave backdoors in its IPSEC network security stack. Since then early audits have found some questionable code, contributors denied any wrongdoing, and the original source reaffirmed his allegations.
itwire.com: Perry, chief executive of a company named GoVirtual, told iTWire: "I have absolutely, positively nothing to gain from making those statements to Theo, and only did so to encourage a source code audit of the OpenBSD Project. If I had this to do over again, I would have sent an anonymous postcard to WikiLeaks.
itworld.com: The allegations from Greg Perry regarding backdoors allegedly placed within OpenBSD about a decade ago seem to be shifting more and more into the realm of fantasy as each day goes by.
itwire.com: The OpenBSD project has found two bugs during an audit of the cryptographic code in which, it has been alleged, the FBI, through former developers, was able to plant backdoors.
itwire.com: Two developers named as having played a role in creating backdoors for the FBI in the open cryptographic framework used in OpenBSD have denied they did so.
ostatic.com: We've all heard rumors of backdoors for governments or rogue elements of governments in Microsoft Windows systems, but did we ever think we might find it in the Open Source world? Well, according to Theo de Raadt, renowned Open Source developer, that just might be the case.
h-online.com: Unknown attackers penetrated the server hosting the open source ProFTPD FTP server project and concealed a back door in the source code.
neowin.net: As requested by a user we wanted to give you a history of viruses on Linux. Given the tight security integrated into Linux, it is difficult to take advantage of a vulnerability on the computer, but some programmers have found ways around the security measures.
h-online.com: Security expert Thomas Cannon has discovered a security vulnerability in the Android browser which can be exploited by attackers to read local files when a smartphone user visits a crafted web site.