The central voice for Linux and Open Source security news.


Where Cybercriminals Go To Buy Your Stolen Data

Wed, 07 Dec 2016 10:04:18 +0000 With nothing more than a standard Web browser, cybercriminals can find personal, private information all over the public Internet. It isn't just legitimate services - from genealogy sites to public records and social media - that can be mined and exploited for nefarious purposes. Openly malicious criminal activities are also happening on the public Internet.

BlackNurse Low-Volume DoS Attack Targets Firewalls

Wed, 07 Dec 2016 09:57:01 +0000 A type of denial of service attack relevant in the 1990s has resurfaced with surprising potency against modern-day firewalls. Dubbed a BlackNurse attack, the technique leverages a low-volume Internet Control Message Protocol (ICMP) -based attack on vulnerable firewalls made by Cisco, Palo Alto, SonicWall and others, according to researchers.

North Korea's Linux-based Red Star OS can be Hacked Remotely with just a Link

Wed, 07 Dec 2016 09:56:04 +0000 North Korea's own homegrown computer operating system, that's supposed to be fully hacker proof and more secure than foreign OS, like Microsoft's Windows, can easily be hacked remotely.

2017 security predictions

Wed, 30 Nov 2016 10:21:15 +0000 From W-2 scams to WordPress vulnerabilities, ransomware, business email compromises, DDos attacks and allegations of a hacked presidential election -- 2016's been a hell of a year in cybersecurity, and it's not over yet.

Firefox zero-day: Mozilla races to patch bug used to attack Tor browser users

Wed, 30 Nov 2016 10:17:47 +0000 Users of online anonymity network Tor are facing a new attack that uses nearly identical code to a Firefox exploit used by the FBI in 2013.

900,000 Deutsche Telekom Routers Disabled by Massive Cyber Attack

Wed, 30 Nov 2016 10:16:31 +0000 A recent cyber attack on Deutsche Telekom hit 900,000 client routers across Germany, disabling Internet, television and phone access for hundreds of thousands of customers.

Gentoo: 201612-19 Mercurial: Multiple vulnerabilities

Wed, 07 Dec 2016 05:54:00 +0000 Multiple vulnerabilities have been found in Mercurial, the worst of which could lead to the remote execution of arbitrary code.

Gentoo: 201612-18 OpenSSH: Multiple vulnerabilities

Wed, 07 Dec 2016 05:49:00 +0000 Multiple vulnerabilities have been found in OpenSSH, the worst of which allows remote attackers to cause Denial of Service.

Gentoo: 201612-17 PECL HTTP: Remote execution of arbitrary code

Wed, 07 Dec 2016 05:44:00 +0000 A buffer overflow in PECL HTTP might allow remote attackers to execute arbitrary code.

Gentoo: 201612-16 OpenSSL: Multiple vulnerabilities

Wed, 07 Dec 2016 05:38:00 +0000 Multiple vulnerabilities have been found in OpenSSL, the worst of which allows attackers to conduct a time based side-channel attack.

Fedora 23 mingw-nsis-2.50-1.fc23

Tue, 06 Dec 2016 20:24:00 +0000 New upstream version 2.50. - Fixes serious DLL hijacking attack:

Red Hat: 2016:2872-01: sudo: Moderate Advisory

Tue, 06 Dec 2016 07:13:00 +0000 An update for sudo is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact [More...]

Social Engineering Methods for Penetration Testing

Fri, 21 Oct 2016 10:18:59 +0000 Social engineering is the practice of learning and obtaining valuable information by exploiting human vulnerabilities. It is an art of deception that is considered to be vital for a penetration tester when there is a lack of information about the target that can be exploited.

Putting Infosec Principles into Practice

Fri, 23 Sep 2016 10:53:29 +0000 When you’re dealing with a security incident it’s essential you – and the rest of your team – not only have the skills they need to comprehensively deal with an issue, but also have a framework to support them as they approach it. This framework means they can focus purely on what they need to do, following a process that removes any vulnerabilities and threats in a proper way – so everyone who depends upon the software you protect can be confident that it’s secure and functioning properly.