toolbox.com/blogs: The current news making a big splash around the Linux community is of a trojan that has been created and deployed on the Gnome-look website. For a start this trojan can not automatically install itself. It is not a virus and relies on social engineering to be effective.
amarok.kde.org/blog: Some of you might have heard about the Malware incident that recently has hit our friends from gnome-look.org. While some of you might chuckle, there have been some discussions about possible solutions for this issue.
omgubuntu.co.uk: Malware has been found hidden inside an innocuous 'waterfall' screensaver .deb file made available on popular artwork sharing site Gnome-Look.org.
computerworlduk.com: In our cosy *nix world we don't suffer from viruses, or rather we didn't. But thanks to an amazing piece of reverse engineering we have SAMBA. What this means is that we can have viruses by proxy if any Linux network we deploy has Windows workstations...
linuxuser.co.uk: Over the last few years, system security has gained a lot of momentum and software professionals are focusing heavily on this aspect. Linux is often treated as a highly secure operating system. However, the reality is that Linux too has its own share of security flaws.
eweekeurope.co.uk: The lack of malware on Linux may be about to change after a developer admitted he has developed a 'package of malware for Unix/Linux'
theregister.co.uk: A security bug in the latest version of the FreeBSD can be exploited to grant unprivileged users complete control over the operating system, a German researcher said Monday.
ubuntu-user.com: Dan Williams, Red Hat collaborator and NetworkManager developer, might be upset but doesn't let it get to him. In the GNOME blog, he advises "just say no" to WiFi drivers in the linux-staging tree and recommends changes.
h-online.com: That the American National Security Agency has previously helped Microsoft harden various Windows versions is old hat, but what is news is that the NSA now also assists Apple, Sun and Red Hat with increasing the security of their operating systems.
linux-magazine.com: A research group in the computer sciences faculty at the North Carolina State University has written a prototype for a rootkit protector that uses kernel object hooks.