|
Source: LinuxSecurity Contributors - Posted by Anthony Pell
|
Thank you for reading the LinuxSecurity.com weekly security newsletter.
The purpose of this document is to provide our readers with a quick
summary of each week's most relevant Linux security headlines. |
|
|
Source: arsTechnica - Posted by Pooja Shah
|
Encrypted connections established by at least 949 of the top 1 million websites are leaking potentially sensitive data because of a recently discovered software vulnerability in appliances that stabilize and secure Internet traffic, a security researcher said Thursday.
|
|
|
Source: Network World - Posted by Pooja Shah
|
Nearly 27 years of network and cybersecurity experience with the Department of Defense didn�t prepare Gary Hayslip for the collection of disparate technologies he encountered when he joined the city of San Diego.
|
|
|
Source: Naked Security / Sophos - Posted by Anthony Pell
|
Attackers are increasingly using Linux security holes to target and infect Internet of Things (IoT) devices that include everything from webcams to internet-connecting household appliances.
That�s among the findings in a SophosLabs malware forecast released today, the first day of RSA Conference 2017 in San Francisco. |
|
|
Source: LinuxSecurity Contributors - Posted by Anthony Pell
|
Thank you for reading the Linux Advisory Watch Security Newsletter.
The purpose of this document is to provide our readers with a quick
summary of each week's vendor security bulletins and pointers on
methods to improve the security posture of your open source system.
|
|
|
Source: InfoSecurity Magazine - Posted by Pooja Shah
|
The event involved malicious software installed on payment card systems at hundreds of its corporate-owned restaurant locations across the US�however, franchises were spared. |
|
|
Source: The Register UK - Posted by Dave Wreski
|
The hackers breached the transport operator's systems and before they knew it had sent a passenger train hurtling into a wall. And the only reason you didn't read about it in the papers was that the systems were an entirely fictitious network created in 2015 to test just how far snoopers or crims would go in attacking vulnerable transport systems.
|
|
|
Source: Linux.com - Posted by Anthony Pell
|
The security vulnerabilities that you need to consider when developing open source software can be overwhelming. Common Vulnerability Enumeration (CVE) IDs, zero-day, and other vulnerabilities are seemingly announced every day. With this flood of information, how can you stay up to date?
|
|
|
Source: CSO Online - Posted by Dave Wreski
|
The U.S. House of Representatives approved on Monday the Email Privacy Act, which would require law enforcement agencies to get court-ordered warrants to search email and other data stored with third parties for longer than six months.
The House approved the bill by voice vote, and it now goes the Senate for consideration. |
|
|
Source: Wired - Posted by Pooja Shah
|
It�s safe to say that any digital privacy bill written more than three years before the invention of the World Wide Web is probably due for an overhaul. But the Electronic Communications Privacy Act has persisted intact for more than three decades, including its anachronistic loophole that allows the warrantless collection of emails from US citizens. |
|
|
Source: ZDNet Security - Posted by Pooja Shah
|
This promises to be great fun! I'm going to be combining two of my favorite things: Kali GNU/Linux software and various models of Raspberry Pi hardware. I have been looking forward to doing this since I first heard that there was a Kali Linux installation image for the Raspberry Pi. |
|
|
Source: LinuxSecurity Contributors - Posted by Anthony Pell
|
Thank you for reading the Linux Advisory Watch Security Newsletter.
The purpose of this document is to provide our readers with a quick
summary of each week's vendor security bulletins and pointers on
methods to improve the security posture of your open source system. |
|
|
Source: eWeek - Posted by Pooja Shah
|
The Amnesic Incognito Live System, also known more simply as Tails, is a privacy-focused Linux distribution loaded with tools and features to help users stay somewhat anonymous on the internet. Tails first rose to prominence in 2013 as the Linux distribution used by U.S. National Security Agency (NSA) whistleblower Edward Snowden and reached the 1.0 milestone in April 2014. |
|
|
Source: InfoWorld - Posted by Anthony Pell
|
Privacy has become an important issue for many users as corporations and governments stop at nothing to gather personal information. But Linux users do have some choices when it comes to distributions that help protect their privacy and security. |
|