Thu, 08 Dec 2016 10:54:00 +0000LinuxSecurity.com: The next major version of OpenVPN, one of the most widely used virtual private networking technologies, will be audited by a well-known cryptography expert.
Thu, 08 Dec 2016 10:42:38 +0000LinuxSecurity.com: A Turkish cyberattack group is luring individuals to join a DDoS platform to compete for points through games which can be redeemed for hacking tools.
Wed, 07 Dec 2016 10:04:18 +0000LinuxSecurity.com: With nothing more than a standard Web browser, cybercriminals can find personal, private information all over the public Internet. It isn't just legitimate services - from genealogy sites to public records and social media - that can be mined and exploited for nefarious purposes. Openly malicious criminal activities are also happening on the public Internet.
Wed, 07 Dec 2016 09:57:01 +0000LinuxSecurity.com: A type of denial of service attack relevant in the 1990s has resurfaced with surprising potency against modern-day firewalls. Dubbed a BlackNurse attack, the technique leverages a low-volume Internet Control Message Protocol (ICMP) -based attack on vulnerable firewalls made by Cisco, Palo Alto, SonicWall and others, according to researchers.
Wed, 07 Dec 2016 09:56:04 +0000LinuxSecurity.com: North Korea's own homegrown computer operating system, that's supposed to be fully hacker proof and more secure than foreign OS, like Microsoft's Windows, can easily be hacked remotely.
Wed, 30 Nov 2016 10:21:15 +0000LinuxSecurity.com: From W-2 scams to WordPress vulnerabilities, ransomware, business email compromises, DDos attacks and allegations of a hacked presidential election -- 2016's been a hell of a year in cybersecurity, and it's not over yet.
Wed, 30 Nov 2016 10:17:47 +0000LinuxSecurity.com: Users of online anonymity network Tor are facing a new attack that uses nearly identical code to a Firefox exploit used by the FBI in 2013.
Wed, 30 Nov 2016 10:16:31 +0000LinuxSecurity.com: A recent cyber attack on Deutsche Telekom hit 900,000 client routers across Germany, disabling Internet, television and phone access for hundreds of thousands of customers.
Mon, 28 Nov 2016 14:19:06 +0000LinuxSecurity.com: No matter what your Linux, you need to protect it with an iptable-based firewall. Yes! You've just set up your first Linux server and you're ready to rock and roll! Right? Uh, no.
Mon, 28 Nov 2016 10:57:52 +0000LinuxSecurity.com: Gaining insight into the files being executed on your system is a great first step towards improved visibility on your endpoints. Taking this a step further, centrally storing logs of file execution data so they can be used for detection and hunting provides an excellent opportunity to find evil on your network.
Mon, 28 Nov 2016 10:10:52 +0000LinuxSecurity.com: We're in the final days of what are loosely known as SHA-1 SSL certificates. In certificates of this sort, the cryptographic hash or "message digest" that is used as a digital fingerprint is caclulated, as the name suggests, using the SHA-1 algorithm.
Fri, 25 Nov 2016 10:41:03 +0000LinuxSecurity.com: From the revelations of Edward Snowden to the potential problems with the Internet of Things and the latest malware, security and privacy are constantly in the news. The trouble is, while everyone is concerned about security and privacy, few know what to what to do about them. Fortunately, Linux has endless tools to address these problems without requiring that everyone become an expert.