Language Selection

English French German Italian Portuguese Spanish

Security

New security hole in VLC video player

Filed under
Security

heise-online.co.uk: A new critical security hole has been found in the VLC player from the VideoLan project, while there is still no public fix for the previous security hole found two weeks ago.

Linux under attack: Compromised SSH keys lead to rootkit

Filed under
Linux
Security

blogs.zdnet: The U.S. Computer Emergency Readiness Team (CERT) has issued a warning for what it calls “active attacks” against Linux-based computing infrastructures using compromised SSH keys.

Red Hat fesses up to Fedora FOSS security fiasco

Filed under
Linux
Security

itwire.com: A week or so ago, end users of the Linux-based Red Hat Fedora OS were warned to avoid downloading packages due to an "issue in the infrastructure systems" which waved big red flags suggesting a security breach to many industry observers.

Red Hat Infrastructure report

Filed under
Linux
Security

redhat.com: Last week we discovered that some Fedora servers were illegally
accessed. The intrusion into the servers was quickly discovered, and the
servers were taken offline.

Linux Mint Server hacked

Filed under
Linux
Security
Web

linuxmint.com/blog: Our server was hacked and code was injected into it to make connections on our behalf to pinoc.org and download a trojan called JS/Tenia.d

Howto Securely Wipe A Harddrive With Linux

Filed under
Security

Examples of "shred" usage on a fresh install of Ubuntu 8.04.1

DefCon: Restraining Order Issued; Talk Cancelled

Filed under
Security
Legal

blog.wired.com: The Massachusetts Bay Transportation Authority filed a suit in federal court on Friday seeking a temporary restraining order to prevent three undergraduate students from the Massachusetts Institute of Technology from presenting a talk at the DefCon hacker conference this weekend about security vulnerabilities in payment systems used in the Massachusetts mass transit system.

Howto Install Metasploit

Filed under
Security

A tutorial on howto setup Metasploit, a tool for exploit testing, IDS, and pen testing.

How A rootkit Exactly Works

Filed under
Security

How A rootkit Exactly Works — Explaination and dissection of the dica rootkit (a variant of the t0rn rootkit).

Debunking the Linux virus myth

Filed under
Linux
Security

mylro.org: Linux and UNIX-like operating systems in general are regarded as being more secure for the common user, in contrast with operating systems that have "Windows" as part of their name. Why is that?

Syndicate content

More in Tux Machines

Tails 1.1.1 is out

The next Tails release is scheduled for October 14. Have a look to our roadmap to see where we are heading to. Read more

Healthdirect Australia sees value in open source for security solution

Commonwealth and state/territory government funded public company, Healthdirect Australia, has used open source software to build an identity and access management (IAM) solution. The IAM solution allows users to have one identity across all of its websites and applications. For example, users can sign in using their Facebook, LinkedIn or Gmail account. Read more

Ubuntu Installer Bug Can Delete Your Hard Drive and All Other OSes

The Ubuntu installation procedure is governed by a piece of software called Ubiquity and it's one of the most intuitive and easy-to-use installers on the Linux platform. Unfortunately, users have been confronting with a bug that could wipe their entire hard-driver without any kind of announcement. Read more

You have your Windows in my Linux

Although there are those who think the systemd debate has been decided in favor of systemd, the exceedingly loud protests on message boards, forums, and the posts I wrote over the past two weeks would indicate otherwise. I've seen many declarations of victory for systemd, now that Red Hat has forced it into the enterprise with the release of RHEL 7. I don't think it's that easy. Read more