linux.com: After forty years in the commercial computing business, the one idea that has been drilled into me by security professionals is the fact that there is no such thing as a secure computer system, only levels of insecurity.
blogs.techrepublic.com: I recently read a blog posting that denounced the use of sudo as insecure. My first reaction was that the author had no idea how to use sudo properly or why you would want to.
fewt.com: It is often said that Linux is more secure than Windows, and for enterprise workloads this tends to be very true. Desktop Linux is a completely different use case, and unfortunately security configuration is sadly way behind (read: non-existent).
thepcspy.com: Every month or so, I find some blog or forum post telling the world that because Linux is so hardcore, there's very little chance of it getting any malware. As you can probably tell from the title, I disagree and want these people to recognise why their arrogance is dangerous.
dedoimedo.com: And the simple answer is: no, you do not need an anti-virus in Linux. Yes, let me tell you a little secret. Come closer. That's it. You don't need an anti-virus in Windows, either! Boom! There you go.
- Got Security? You're in Denial
- Collection of security checks for Linux
- Worst. Security Product. EVER!
- Multi-user Security in Linux
zdnet.com.au: IT security company Sense of Security has discovered a serious bug in Apache's HTTP web server, which could allow a remote attacker to gain complete control of a database.
ebb.org/bkuhn/blog: I had a hunch what was going on. I quickly downloaded a copy of the academic paper that was cited as the sole source for the story and read it. As I feared, OpenSSL was getting some bad press unfairly.
theregister.co.uk: Computer scientists say they've discovered a "severe vulnerability" in the world's most widely used software encryption package that allows them to retrieve a machine's secret cryptographic key.
longitudetech.com: The consensus among new Unix and Linux users seems to be that sudo is more secure than using the root account, because it requires you type your password to perform potentially harmful actions. In reality, a compromised user account, which is no big deal normally, is instantly root in most setups.