techworld.com: Security researchers have discovered what appears to be an experimental Linux rootkit designed to infect its highly select victims during a classic drive-by website attack.
hothardware.com: There seems to be a recurring phenomenon in the technology press, where any trojan that affects Linux or Macs becomes front page news. On the other hand, trojans that affect Windows are mostly ignored.
theregister.co.uk: Security researchers have discovered a potential dangerous Linux and Mac OS X cross-platform trojan.
pcworld.com: The Adobe fix aims to cure an "object confusion vulnerability" discovered in all versions of the player -- Windows, Macintosh, Linux, and Android -- but thus far has only been used to attack Windows systems using Microsoft's browser software.
theregister.co.uk: A student has discovered a critical vulnerability in BackTrack, a flavour of Linux that's a favourite among security pros.
pcworld.com: Given the vast numbers of Macs that are apparently infected with the Flashback Trojan malware, it's not at all surprising to see that sales of Mac security software are now skyrocketing.
zdnet.com.au: Patches have been released for file-networking protocol software, Samba, revealing that the software, which is used extensively in Macs and Linux, has been subject to a critical vulnerability for almost a decade.
linuxinsider.com: In the meantime, another compelling conversation has been raging for some time now, and Linux Girl would be remiss not to cover it, because it's an important topic. Privacy, that is -- and the costs that go along with it.
phoronix.com: Just about 24 hours ago I spread the news about a major vulnerability in X.Org / XKB that makes it trivial for anyone with physical access to a Linux-based desktop system to easily bypass any screensaver lock whether you're using GNOME, KDE, or most other desktop environments. So what's changed in the past day?
mrpogson.com: One of the advantages of FLOSS (Free/Libre Open Source Software) is that it’s not created and distributed in the vacuum of a heavily EULAed/binary/closed environment and anyone can examine the code.