ebb.org/bkuhn/blog: I had a hunch what was going on. I quickly downloaded a copy of the academic paper that was cited as the sole source for the story and read it. As I feared, OpenSSL was getting some bad press unfairly.
theregister.co.uk: Computer scientists say they've discovered a "severe vulnerability" in the world's most widely used software encryption package that allows them to retrieve a machine's secret cryptographic key.
longitudetech.com: The consensus among new Unix and Linux users seems to be that sudo is more secure than using the root account, because it requires you type your password to perform potentially harmful actions. In reality, a compromised user account, which is no big deal normally, is instantly root in most setups.
itworld.com: Get a grip people. A recent story about the so-called Chuck Norris botnet implies that it breaks Linux's security. Wrong.
geekscrap.com: Recently, I’ve browsed several how-to’s regarding the possibility of unlocking a LUKS root volume remotely using an SSH connection. The problem with their approach is simple: they asked how to fix their setup, but forgot to ask what they’re trying to protect.
ghacks.net: You’ve just set up your Linux desktop. Naturally you want it to be as secure as possible. You’ve heard the rumors that, out of the box, Linux has outstanding security. Is it true? Do you really want to take a chance with that? Most likely not. But what can you do?
h-online.com: The Tor project developers have advised users to update their Tor anonymity software to version 0.2.1.22 or 0.2.2.7-alpha as soon as possible. This is because, in early January, two of the project's seven directory authorities (moria1 and gabelmoo) as well as the metrics.torproject.org statistics server were found to have been hacked.
pthree.org: This post is not meant to be a sure method for defeating attackers. That you can make the process so tedious and time consuming for the attacker, that he will likely not bother and move to another victim. This post is about those methods.
toolbox.com/blogs: The current news making a big splash around the Linux community is of a trojan that has been created and deployed on the Gnome-look website. For a start this trojan can not automatically install itself. It is not a virus and relies on social engineering to be effective.
amarok.kde.org/blog: Some of you might have heard about the Malware incident that recently has hit our friends from gnome-look.org. While some of you might chuckle, there have been some discussions about possible solutions for this issue.