maketecheasier.com: When a seasoned Windows user first migrates to Linux, the first question is always “where is the anti-virus?” I have been asked this question countless time and were always given the “you are lying to me” kind of look when I told them that they don’t need anti-virus software in Linux.
linuxworld.com (IDG): It's the most anticipated matchup in the hacker world: Linux versus Mac OS X versus Vista. Who will get hacked first? That's what organizers of the CanSecWest security conference hope to discover this week.
linux.com: Given all the fuss in the news recently about compromised Linux/Apache servers being responsible for infecting Windows users with malware when they visit those compromised sites, we thought it would be a good time to take a look at three of the best rootkit/malware detection tools available for Linux desktop and SOHO users.
linux-watch.com: With open source that can be a very good thing since when security problems are found they can be fixed quickly. That's the case over this last weekend, Feb. 9-10, when a security problem was found, and given a hot fix, in the 2.6.17 to the most recent production Linux kernel, 184.108.40.206.
Also: Stable and unstable kernel releases
risesecurity.org: We recently acquired an ASUS Eee PC. The first thing we did when we put our hands at the ASUS Eee PC was to test its security.
scmagazineus.com: Security vendor SecureWorks reported this week that the mass attack launched against Apache web servers running on the open-source Linux operating system can be thwarted by disabling dynamic loading in the Apache configuration.
LinuxWorld: Mozilla is working to fix a browser flaw that could give attackers unauthorized access to data on a victim's machine.
Also: Super Techies: Brendan Eich
iTWire: A new report reveals that in 2007 organised criminal gangs for the first time started attacking Internet connected Apple products with the intention of stealing money. The report issues a chilling warning that the increased popularity of Mac computers and the enthusiastic take-up of net connected products such as iPhone and iPod Touch has its down side.
htmlfixit.com: Secunia have reported that more flaws were found in Redhat Linux (633) than in Windows (123), but even a blind man can see it is nowhere near a fair comparison.
Are you using SSH in the best way possible? Have you configured it to be as limited and secure as possible? The goal of this document is to kick in the new year with some best practices for SSH: why you should use them, how to set them up, and how to verify that they are in place. All of the examples below assume that you are using EnGarde Secure Linux but any modern Linux distribution will do just fine since, as far as I know, everybody ships OpenSSH.