- Mozilla launches massive campaign on digital surveillance
- Got a PRISM and Boundless Informant problem? Whisper and Tor can help
- Berlin rejects open source plan, looks to open standards instead
- TuxRadar Open Ballot: Big Brother
worldofgnome.org: For Free Software fans, malware is considered any non-open source software, like your nVidia or Catalyst proprietary drivers. So for this post I tried Avira Antivirus which isn’t free, to fight the fire with fire, or in my case to fight a malware with a malware
arstechnica.com: A month after critical bug was quietly fixed, "root" vulnerability persists.
h-online.com: Coverity has called Linux the "benchmark of quality" in its newly published 2012 Coverity Scan Open Source report. Linux 3.8's 7.6 million lines of code has a defect density of .59.
itworld.com: Security vendors analyzing the code used in the cyberattacks against South Korea are finding nasty components designed to wreck infected computers. Tucked inside a piece of Windows malware used in the attacks is a component that erases Linux machines.
thevarguy.com: Open source fans like to brag that Linux needs no antivirus software. Yet as executives at security vendor ESET were keen to remind me in a recent interview, that truism holds true only to a certain extent.
itwire.com: Researchers at Sourcefire have analysed 25 years of vulnerabilities that were reported to CVE and NVD databases and found some interesting results.
What's the best way to secure an enterprise network, including both communications and data? No single solution fits all situations, but the practices outlined here mark a solid starting point on which IT departments can build.
dontsurfinthenude.blogspot: You don't need an anti-virus program on Linux: I've said it before, but Don't Surf in the Nude started because of an interest in internet security, so I can't resist trying out anti-virus programs in Linux.
techworld.com: Security researchers have discovered what appears to be an experimental Linux rootkit designed to infect its highly select victims during a classic drive-by website attack.