heise-online.co.uk: A new critical security hole has been found in the VLC player from the VideoLan project, while there is still no public fix for the previous security hole found two weeks ago.
blogs.zdnet: The U.S. Computer Emergency Readiness Team (CERT) has issued a warning for what it calls “active attacks” against Linux-based computing infrastructures using compromised SSH keys.
itwire.com: A week or so ago, end users of the Linux-based Red Hat Fedora OS were warned to avoid downloading packages due to an "issue in the infrastructure systems" which waved big red flags suggesting a security breach to many industry observers.
redhat.com: Last week we discovered that some Fedora servers were illegally
accessed. The intrusion into the servers was quickly discovered, and the
servers were taken offline.
linuxmint.com/blog: Our server was hacked and code was injected into it to make connections on our behalf to pinoc.org and download a trojan called JS/Tenia.d
Examples of "shred" usage on a fresh install of Ubuntu 8.04.1
blog.wired.com: The Massachusetts Bay Transportation Authority filed a suit in federal court on Friday seeking a temporary restraining order to prevent three undergraduate students from the Massachusetts Institute of Technology from presenting a talk at the DefCon hacker conference this weekend about security vulnerabilities in payment systems used in the Massachusetts mass transit system.
A tutorial on howto setup Metasploit, a tool for exploit testing, IDS, and pen testing.
How A rootkit Exactly Works — Explaination and dissection of the dica rootkit (a variant of the t0rn rootkit).
mylro.org: Linux and UNIX-like operating systems in general are regarded as being more secure for the common user, in contrast with operating systems that have "Windows" as part of their name. Why is that?