Security

ID theft, vulnerabilities, privacy issues, etc

SCAP: computer security for the rest of us

Filed under
Security

opensource.com: I'm setting up a new computer. I get through the registration screens, install my software, change my wallpaper, and everything's working fine. I'm left, though, with a lingering, uneasy feeling: I don't know if this machine is secure.

FOSS Security Updates vs Microsoft Patch Day

Filed under
OSS
Security

blog.eracc.com: It is almost that time again. The ritual of installing Microsoft patches released on the second Tuesday of each month to fix security problems. It is an ironic coincidence that I have received update notices from Mandriva for software installed on my Linux PC systems as well this weekend.

Linux distributions update for Web flaw

Filed under
Linux
Security

itworld.com (IDG): A number of Linux distributors have issued patches for fixing a widely used program that fetches Web pages, called Wget, so it can not be misused by attackers.

LinuxCon: Exploits Show Why Linux Is Vulnerable

Filed under
Linux
Security

esecurityplanet.com: There is a widely held belief that Linux is a completely secure operating system. But to Brad Spengler of the grsecurity project, the belief is far from accurate. And he has the kernel exploits to prove it.

Unix How-To: Give Me That Old-Time Security!

Filed under
Security
HowTos

itworld.com: Even in the wild frontiers of today's Internet, good basic Unix system security provides extremely valuable protection against security breaches. In today's column, I'm going to rant about some basic security rules of thumb that every Unix sysadmin ought to consider.

Security vs. Convenience

Filed under
Security

linuxjournal.com: Although my intent is not to start the next GNOME/KDE-level war, it seems there must be a happy medium between total desktop insecurity and total desktop unusability.

Locking Down Linux: Is it Necessary?

Filed under
Linux
Security

jeffhoogland.blogspot: Many Linux Advocates, myself included, assert that our operating system of choice is more than ready for the "general public" or "average user". In recent years it seems the term "user friendliness" has become associated with the exact opposite of what I love about Linux:

Linux, trojans and viruses. A real threat?

Filed under
Security

toolbox.com/blogs: While there is no excuse for inattention and lack of knowledge, the fact is that there are Linux virus's (viruses, virii?) and there will be more.

A wake up call for sleepy Linux users.

Filed under
Security

toolbox.com/blog: The alarm has rung several times before and each time the snooze button was pressed. This time, just recently, the alarm has rung with yet another compromised download resulting in another Linux trojan back door. The time has come for us to stop hitting that snooze button.

Linux is as secure as ever

Filed under
Linux
Security

itworld.com: There have been several stories proclaiming that a recent Linux infection proves Windows malware monopoly is over and that Think Linux is free from malware? Think again; it's been hacked. Much as it pains me to disagree with the good people, they're wrong.

Five tips for improving Linux security

Filed under
Linux
Security
HowTos

blogs.techrepublic.com: Protecting a networked computer is a never-ending challenge — even in Linux. These simple measures will help protect your Linux box.

Is Linux Secure

Filed under
Security
  • Linux infection proves Windows malware monopoly is over
  • "Is Linux Secure?" at Southeast LinuxFest

Broken Links in Linux File Systems can be a Security Risk

Filed under
Security

tcs-security-blanket.blogspot: BROKEN LINKS in Linux file systems are not just annoying — they can also be a security risk. In a previous post, I discussed the potential dangers of unowned files and in this post I will talk about those annoying, resource consuming broken links usually considered simple file system “lint”.

Windows, Mac or Linux: Which is the most secure?

Filed under
Security

computerworlduk.com: Who's got the safest operating system? Apple, Google, Microsoft? According to one security expert, what really matters is who's using the OS.

Nigori: Storing Secrets in the Cloud

Filed under
Software
Security

links.org: Nigori is a protocol for storing secrets in the cloud such that the storage need not be trusted and only a single password is required to access secrets.

It's called sudo

Filed under
Security

linuxinexile.blogspot: Organizations can no longer tolerate the security risks posed by intentional, accidental or indirect misuse of privileges. You will learn how to securely delegate privileges and authorization without disclosing the root password.

Web Browsers Leave 'Fingerprints' Behind as You Surf the Net

Filed under
Software
Security
Web

eff.org: New research by the Electronic Frontier Foundation (EFF) has found that an overwhelming majority of web browsers have unique signatures -- creating identifiable "fingerprints" that could be used to track you as you surf the Internet.

Open MySQL security holes

Filed under
Software
Security

h-online.com: Oracle's forthcoming version 5.1.47 of MySQL is said to contain several important security patches. The changelog states that the developers have closed three security holes which allow attackers to cause a server crash, obtain unauthorised database access or, in the worst case, inject arbitrary code and execute it on the server.

Botnets exploit Linux owners' ignorance

Filed under
Linux
Security

securecomputing.net: A lack of knowledge and awareness about how to use Linux mail servers could be contributing to the disproportionately large number of Linux machines being exploited to send spam, according to new Symantec Hosted Services research.

Syndicate content