datamation.com: For years, one of the biggest benefits of escaping Microsoft Windows was that running a security suite with a Linux distribution was completely unnecessary. There simply wasn't a need for it.
winehq.org: I am sad to say that there was a compromise of the WineHQ database system.
lwn.net: Of the 171 trees that represent work for the next merge window, 89 only exist on kernel.org machines. This means (obviously) that I have not had updates to those 89 trees since the kernel.org servers were taken down.
pcworld.com: The website for the open-source MySQL database was hacked and used to serve malware to visitors Monday.
Also: MySQL at the core of commercial open source
mrpogson.com: A recent bug reported in Ubuntu GNU/Linux is that apt-key fails to properly check the package-signing keys downloaded from an Ubuntu repository. Debian has the same faulty code but thankfully it is disabled.
- Is Linux Still The Safest Operating System?
- Some Linux Foundation crack attack details emerge
- Open Ballot: Is Linux really so secure?
zdnet.com.au: The Linux Foundation has pulled its sites offline due to a security breach that occurred on 8 September, which it believes was in connection with an attack on kernel.org.
itwire.com: Seventeen days. That how long it took for the elite administrators at the Linux kernel project to find out that servers at the project had been breached.
readwriteweb.com: The site that hosts the Linux kernel's source code, Kernel.org was compromised earlier this month. The discovery was made on August 28th, and steps are being taken now to enhance security for the site and recovery is underway.
Also: The Cracking of Kernel.org by Jon Corbet
zdnet.com: According to an Ubuntu security alert, the WebKit flaws are dangerous enough to cause arbitrary code execution attacks.
Truecrypt, is a free and open-source disk encryption software. In this post we will show you how to encrypt all your data using Truecrypt in 11 easy steps. With Truecrypt it is possible to encrypt a virtual disk (folder), a partition or a whole storage device. The two most beautiful things with Truecrypt are real-time instantaneous encryption and simple and easy setup.
drbill.cc: I love VLC. It is one of the programs I install on all my systems, whether Windows, or Linux. BUT, some evil, nasty dewds are making the good name of VLC a “hook” to get you to download a modified mailware infested version! Grrrr!
junauza.com: Hackers and hacker groups were quite famous in the 80’s and 90’s but their popularity started fading since the Y2K days. Today, we are once again witnessing hackers threatening to take on giant corporations sending chills down everyone's spine.
mrpogson.com: I was surprised to see Brazil in the list of systems compromised by “Anonymous” recently. To demonstrate the compromise, /etc/passwd from some systems was published.
zdnet.com: Dropbox ‘deceived’ users about the security and encryption of its cloud storage services, according to a complaint made to the FTC.
dedoimedo.com: After Flaming retort, I have another rebuttal. Another piece of scaremongering, with overhyped drama and sensationalism, wrapped in tech lingo to make the crowds shudder with fear and reverence. Today, I want to talk to you about a short article called Botnets exploit Linux owners' ignorance.
jeffhoogland.blogspot: If you watch new projects that are added to source forge then two weeks ago you might have noticed that Tiny Core Linux was added to their projects. I thought this was a little bit odd.
afterdawn.com: Two days into the Pwn2Own hacking challenge, only a few still remain. So far, hackers have not been able to exploit Mozilla Firefox 3.6, Google Chrome, and the mobile Android OS.
internetnews.com: The annual Pwn2Own hacking challenge kicks off today, pitting security researchers against web browsers and mobile platforms. The HP TippingPoint sponsored event grows every year to include more platforms, though Linux isn't among them.
zdnet.com: Hackers have compromised a private e-mail list used by Linux and BSD distributors to share information on embargoed security vulnerabilities and used a backdoor to sniff e-mail traffic, according to the moderator of the list.