mylinuxrig.com: Christmas morning 2012, one of my Gmail accounts was hacked. The good news was that it wasn’t my main account. The bad news was that it was one I used for a fair amount of work-related communication. With web-based clients ruled out, I looked to clients, settling on KeePassX, which is the basis for quite a few password management tools.
linuxadvocates.com: It's more than a bit worrisome not just for Amazon Web Services, but other Cloud ISPs as well as their customers who need to come to terms with the legality of what the disclosure of the NSA PRISM surveillance program means in pure risk management terms.
softpedia.com: The National Security Agency or NSA is now in the public eye for some nefarious surveillance, but Linux users should know that the agency also had an active role the Linux kernel development, with the addition of SELinux.
- Mozilla launches massive campaign on digital surveillance
- Got a PRISM and Boundless Informant problem? Whisper and Tor can help
- Berlin rejects open source plan, looks to open standards instead
- TuxRadar Open Ballot: Big Brother
worldofgnome.org: For Free Software fans, malware is considered any non-open source software, like your nVidia or Catalyst proprietary drivers. So for this post I tried Avira Antivirus which isn’t free, to fight the fire with fire, or in my case to fight a malware with a malware
arstechnica.com: A month after critical bug was quietly fixed, "root" vulnerability persists.
h-online.com: Coverity has called Linux the "benchmark of quality" in its newly published 2012 Coverity Scan Open Source report. Linux 3.8's 7.6 million lines of code has a defect density of .59.
itworld.com: Security vendors analyzing the code used in the cyberattacks against South Korea are finding nasty components designed to wreck infected computers. Tucked inside a piece of Windows malware used in the attacks is a component that erases Linux machines.
thevarguy.com: Open source fans like to brag that Linux needs no antivirus software. Yet as executives at security vendor ESET were keen to remind me in a recent interview, that truism holds true only to a certain extent.
itwire.com: Researchers at Sourcefire have analysed 25 years of vulnerabilities that were reported to CVE and NVD databases and found some interesting results.