Short bio: Computer Scientist, FOSS supporter (read more)
Tux Machines (TM)-specific
computerworlduk.com: In our cosy *nix world we don't suffer from viruses, or rather we didn't. But thanks to an amazing piece of reverse engineering we have SAMBA. What this means is that we can have viruses by proxy if any Linux network we deploy has Windows workstations...
linuxuser.co.uk: Over the last few years, system security has gained a lot of momentum and software professionals are focusing heavily on this aspect. Linux is often treated as a highly secure operating system. However, the reality is that Linux too has its own share of security flaws.
eweekeurope.co.uk: The lack of malware on Linux may be about to change after a developer admitted he has developed a 'package of malware for Unix/Linux'
theregister.co.uk: A security bug in the latest version of the FreeBSD can be exploited to grant unprivileged users complete control over the operating system, a German researcher said Monday.
ubuntu-user.com: Dan Williams, Red Hat collaborator and NetworkManager developer, might be upset but doesn't let it get to him. In the GNOME blog, he advises "just say no" to WiFi drivers in the linux-staging tree and recommends changes.
h-online.com: That the American National Security Agency has previously helped Microsoft harden various Windows versions is old hat, but what is news is that the NSA now also assists Apple, Sun and Red Hat with increasing the security of their operating systems.
linux-magazine.com: A research group in the computer sciences faculty at the North Carolina State University has written a prototype for a rootkit protector that uses kernel object hooks.
h-online.com: According to security services provide Secunia, a vulnerability in the free image editing tool GIMP (GNU Image Manipulation Program) can potentially be exploited to compromise a users system.
aplawrence.com: A customer reported that a Linux machine used for ssh access (to in turn give telnet access to an ancient SCO machine) was refusing logins. I asked him to try logging in as root at the console; he was unable to do so.
links.org: For the last 6 weeks or so, a bunch of us have been working on a really serious issue in SSL. In short, a man-in-the-middle can use SSL renegotiation to inject an arbitrary prefix into any SSL session, undetected by either end.
mdeslaur.blogspot: For the past week or so, people have been talking about a “security issue” in Seahorse. This sums up my opinion on the matter: This isn't a security issue, and there is no good way to fix it.
theregister.co.uk: A software developer has uncovered a bug in most versions of Linux that could allow untrusted users to gain complete control over the open-source operating system.
ubuntu-user.com: The current discussion in the Ubuntu forums is about a possible security hole in GNOME, specifically about GNOME registered users having their passwords appear as cleartext on the keyring. Not a bug, say its defenders, but the security concept behind the GNOME keyring.
omgubuntu.co.uk: A security hole in Gnome allows anyone to see your keyring passwords without needing to enter so much as a password.
h-online.com: Security holes in numerous PDF applications allow attackers to infect systems with malware. Linux distributor Red Hat has already released new packages for these applications, and other distributors are likely to follow soon.