LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: February 13th, 2017
Linux Advisory Watch: February 10th, 2017
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Linux Security Week: February 13th, 2017  13 February 2017 
Source: LinuxSecurity Contributors - Posted by Anthony Pell   
Linux Security Week Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.
 
Newly discovered flaw undermines HTTPS connections for almost 1,000 sites  13 February 2017 
Source: arsTechnica - Posted by Pooja Shah   
Cryptography Encrypted connections established by at least 949 of the top 1 million websites are leaking potentially sensitive data because of a recently discovered software vulnerability in appliances that stabilize and secure Internet traffic, a security researcher said Thursday.
 
How San Diego fights off 500,000 cyberattacks a day  13 February 2017 
Source: Network World - Posted by Pooja Shah   
Intrusion Detection Nearly 27 years of network and cybersecurity experience with the Department of Defense didn�t prepare Gary Hayslip for the collection of disparate technologies he encountered when he joined the city of San Diego.
 
RSA 2017: SophosLabs sees spike in Linux-IoT malware  13 February 2017 
Source: Naked Security / Sophos - Posted by Anthony Pell   
Vendors/Products Attackers are increasingly using Linux security holes to target and infect Internet of Things (IoT) devices that include everything from webcams to internet-connecting household appliances. That�s among the findings in a SophosLabs malware forecast released today, the first day of RSA Conference 2017 in San Francisco.
 
Linux Advisory Watch: February 10th, 2017  10 February 2017 
Source: LinuxSecurity Contributors - Posted by Anthony Pell   
Linux Advisory Watch Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system.
 
Arby's Gets Roasted in Breach of 300K Payment Cards  10 February 2017 
Source: InfoSecurity Magazine - Posted by Pooja Shah   
Hacks/Cracks The event involved malicious software installed on payment card systems at hundreds of its corporate-owned restaurant locations across the US�however, franchises were spared.
 
Honeypots: Free psy-ops weapons that can protect your network before defences fail  09 February 2017 
Source: The Register UK - Posted by Dave Wreski   
Intrusion Detection The hackers breached the transport operator's systems and before they knew it had sent a passenger train hurtling into a wall. And the only reason you didn't read about it in the papers was that the systems were an entirely fictitious network created in 2015 to test just how far snoopers or crims would go in attacking vulnerable transport systems.
 
How to Manage the Security Vulnerabilities of Your Open Source Product  08 February 2017 
Source: Linux.com - Posted by Anthony Pell   
Security Projects The security vulnerabilities that you need to consider when developing open source software can be overwhelming. Common Vulnerability Enumeration (CVE) IDs, zero-day, and other vulnerabilities are seemingly announced every day. With this flood of information, how can you stay up to date?
 
US House approves new privacy protections for email and the cloud  07 February 2017 
Source: CSO Online - Posted by Dave Wreski   
Government The U.S. House of Representatives approved on Monday the Email Privacy Act, which would require law enforcement agencies to get court-ordered warrants to search email and other data stored with third parties for longer than six months. The House approved the bill by voice vote, and it now goes the Senate for consideration.
 
Passing the Email Privacy Act Has Never Been More Urgent  07 February 2017 
Source: Wired - Posted by Pooja Shah   
Government It�s safe to say that any digital privacy bill written more than three years before the invention of the World Wide Web is probably due for an overhaul. But the Electronic Communications Privacy Act has persisted intact for more than three decades, including its anachronistic loophole that allows the warrantless collection of emails from US citizens.
 
Kali Linux on the Raspberry Pi: 3, 2, 1, and Zero  06 February 2017 
Source: ZDNet Security - Posted by Pooja Shah   
Security Projects This promises to be great fun! I'm going to be combining two of my favorite things: Kali GNU/Linux software and various models of Raspberry Pi hardware. I have been looking forward to doing this since I first heard that there was a Kali Linux installation image for the Raspberry Pi.
 
Linux Advisory Watch: February 3rd, 2017  03 February 2017 
Source: LinuxSecurity Contributors - Posted by Anthony Pell   
Linux Advisory Watch Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system.
 
Privacy-Focused Tails 2.10 Linux Includes Security Updates, New Tools  03 February 2017 
Source: eWeek - Posted by Pooja Shah   
Security Projects The Amnesic Incognito Live System, also known more simply as Tails, is a privacy-focused Linux distribution loaded with tools and features to help users stay somewhat anonymous on the internet. Tails first rose to prominence in 2013 as the Linux distribution used by U.S. National Security Agency (NSA) whistleblower Edward Snowden and reached the 1.0 milestone in April 2014.
 
Linux: The 10 best privacy and security distributions  03 February 2017 
Source: InfoWorld - Posted by Anthony Pell   
Vendors/Products Privacy has become an important issue for many users as corporations and governments stop at nothing to gather personal information. But Linux users do have some choices when it comes to distributions that help protect their privacy and security.
 
    
Partner

 

Latest Features
Social Engineering Methods for Penetration Testing
Putting Infosec Principles into Practice
Installing an Apache Web Server with TLS
Essential tools for hardening and securing Unix based Environments
Securing a Linux Web Server
Peter Smith Releases Linux Network Security Online
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Sponsor:

 

Yesterday's Edition
RSA 2017: SophosLabs sees spike in Linux-IoT malware
How San Diego fights off 500,000 cyberattacks a day
Newly discovered flaw undermines HTTPS connections for almost 1,000 sites
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2017 Guardian Digital, Inc. All rights reserved.