Subscribe: LinuxSecurity.com
http://www.linuxsecurity.com/linuxsecurity_hybrid.rdf
Preview: LinuxSecurity.com

LinuxSecurity.com



The central voice for Linux and Open Source security news.



 



Equifax's disastrous Struts patching blunder: THOUSANDS of other orgs did it too

Wed, 20 Sep 2017 09:31:19 +0000

LinuxSecurity.com: Thousands of companies may be susceptible to the same type of hack that recently struck Equifax. The Equifax breach was the result of a vulnerable Apache Struts component.



Cloud Security Error Exposes Half a Million Voters' Personal Information

Wed, 20 Sep 2017 09:25:26 +0000

LinuxSecurity.com: Another day, another cloud leak: Kromtech researchers recently came across a misconfigured CouchDB database exposing information on 593,328 Alaskan voters.



First ever crypto-mining Chrome extension discovered

Wed, 20 Sep 2017 09:23:53 +0000

LinuxSecurity.com: A Chrome browser extension, with over 140,000 users, is gobbling up the resources of users' computers by secretly mining for virtual cash.



The laws that are ruining the Internet

Tue, 19 Sep 2017 10:35:28 +0000

LinuxSecurity.com: But some of the laws created to protect us have strings attached-and some of these strings could strangle the Internet. That's because laws have many sections with unclear writing that allow for interpretations so broad that not even Dora could explore them. The concern is that these laws could create a chilling effect-that is, when people quell their own speech in fear of litigation or sanctions.



Pirate Bay digs itself a new hole: Mining alt-coin in slurper browsers

Tue, 19 Sep 2017 09:03:29 +0000

LinuxSecurity.com: Bittorrent search engine and mortal enemy of intellectual property lawyers, The Pirate Bay, has upset the one group of people that actually likes it: its users.



5 Ways to Secure Wi-Fi Networks

Tue, 19 Sep 2017 09:00:49 +0000

LinuxSecurity.com: Wi-Fi is one entry-point hackers can use to get into your network without setting foot inside your building because wireless is much more open to eavesdroppers than wired networks, which means you have to be more diligent about security.



openSUSE: 2017:2540-1: important: xen

Thu, 21 Sep 2017 06:23:00 +0000

LinuxSecurity.com: An update that solves four vulnerabilities and has two An update that solves four vulnerabilities and has two An update that solves four vulnerabilities and has two fixes is now available. fixes is now available.



openSUSE: 2017:2535-1: important: emacs

Wed, 20 Sep 2017 21:21:00 +0000

LinuxSecurity.com: An update that fixes one vulnerability is now available. An update that fixes one vulnerability is now available. An update that fixes one vulnerability is now available.



Fedora 26: mpg123 Security Update

Wed, 20 Sep 2017 19:16:00 +0000

LinuxSecurity.com: Update to upstream release 1.25.6



Fedora 25: libwmf Security Update

Wed, 20 Sep 2017 16:07:00 +0000

LinuxSecurity.com: - Related: CVE-2017-6362 remove problematic function



SuSE: 2017:2534-1: important: the Linux Kernel

Wed, 20 Sep 2017 15:22:00 +0000

LinuxSecurity.com: An update that fixes one vulnerability is now available. An update that fixes one vulnerability is now available. An update that fixes one vulnerability is now available.



SuSE: 2017:2532-1: important: emacs

Wed, 20 Sep 2017 12:23:00 +0000

LinuxSecurity.com: An update that fixes one vulnerability is now available. An update that fixes one vulnerability is now available. An update that fixes one vulnerability is now available.



Social Engineering Methods for Penetration Testing

Fri, 21 Oct 2016 10:18:59 +0000

LinuxSecurity.com: Social engineering is the practice of learning and obtaining valuable information by exploiting human vulnerabilities. It is an art of deception that is considered to be vital for a penetration tester when there is a lack of information about the target that can be exploited.



Putting Infosec Principles into Practice

Fri, 23 Sep 2016 10:53:29 +0000

LinuxSecurity.com: When you’re dealing with a security incident it’s essential you – and the rest of your team – not only have the skills they need to comprehensively deal with an issue, but also have a framework to support them as they approach it. This framework means they can focus purely on what they need to do, following a process that removes any vulnerabilities and threats in a proper way – so everyone who depends upon the software you protect can be confident that it’s secure and functioning properly.