Linux Today: Linux News On Internet Time.

Most Read Stories

Editor's Picks

OpenStack Moves From Integrated Release to Big Tent Model
eWEEK: The integrated release model is dead, being replaced with a new "Big Tent" model... (May 19, 2015)

Linux 4.1 rc4
Linus Torvalds: Go forth and test, and let everybody know about any regressions you find (May 19, 2015)

More on LinuxToday

Linux Today - Security

Secure SSH with Google Authenticator Two-Factor Authentication on CentOS 7
(May 22, 2015, 10:00) (0 talkbacks)

 HowToForge: SSH access to servers is always critical and you might want to find ways to improve the security of your SSH login.

Tails 1.4 Linux Distro Fixes Security Flaws, Focuses on Privacy
(May 21, 2015, 04:00) (0 talkbacks)

eWEEK: In this slide show, eWEEK examines key features of the Tails 1.4 release.

The VENOMous Search for the Next Heartbleed
(May 15, 2015, 06:02) (0 talkbacks)

eWEEK: Does every vulnerability need a logo and its own Website like Heartbleed and now VENOM have? Here's why not every flaw is "the next big thing."

How to block specific user agents on nginx web server
(May 14, 2015, 10:00) (0 talkbacks)

 xmodulo: The modern Internet is infested with various malicious robots and crawlers such as malware bots, spambots or content scrapers which are scanning your website in surreptitious ways

For Venom security flaw, the fix is in: Patch your VM today
(May 13, 2015, 19:00) (0 talkbacks)

 ZDnet: Don't think you're vulnerable? You might want to double check that.

Linux Top 3: Tails 1.4, 4MLinux 12 and TinyCore Linux 6.2
(May 12, 2015, 19:49) (0 talkbacks)

LinuxPlanet: Nearly a year after Tails 1.0, and the Tails 1.4 release is now available.

Mozilla Firefox 38 Gets a Baker's Dozen Security Updates
(May 12, 2015, 15:00) (0 talkbacks)

eWEEK: Five of the 13 security updates for Firefox 38 are considered critical. Mozilla also disabled the RC4 cipher suite for encrypted TLS data.

3 security questions to ask when vetting a vendor who needs company data
(May 11, 2015, 19:00) (0 talkbacks)

 enterprisersproject: Closely scrutinizing how potential vendors keep that data secure is crucial to vendor selection.

Encrypting and decrypting files with password in Linux
(May 11, 2015, 10:00) (1 talkbacks)

 blackmoreops: Sometimes you need to send a file containing sensitive information across to someone over internet and you started thinking

Microsoft's new secure boot strategy will suit Linux firms
(May 09, 2015, 10:00) (5 talkbacks)

 ITwire: Linux companies Red Hat, SUSE and Canonical will benefit from the decision by Microsoft to suggest that OEMs not provide a means of turning off secure boot on PCs running Windows 10.

New Linux rootkit leverages GPUs for stealth
(May 08, 2015, 14:00) (0 talkbacks)

 ITworld: A team of developers has created a rootkit for Linux systems that uses the processing power and memory of graphics cards instead of CPUs in order to remain hidden.

Docker Gets Serious About Security
(May 08, 2015, 10:00) (0 talkbacks)

eWEEK: Two months after Docker brings in new faces to lead security efforts, a new benchmark for securing Docker container deployments debuts.

Top OpenStack Security Dev from Nebula Didn't go to Oracle, He Went to Netflix
(May 08, 2015, 06:00) (0 talkbacks) Lots of chatter in my news feeds the last few days about Oracle allegedly hiring most of Nebula's OpenStack devs. Trouble is it's not entirely accurate.

QuinStreet Enterprise Research: Security Breaches Lead to Server Corruption
(May 06, 2015, 23:00) (0 talkbacks)

ServerWatch: In the modern IT landscape, news about security breaches is a common occurrence. For server administrators, what's there to worry about? As it turns out — lots.

Netflix open-sources security incident management tool
(May 06, 2015, 13:00) (0 talkbacks)

 NetworkWorld: Netflix has released under an open-source license an internal tool it developed to manage a deluge of security alerts and incidents.

76 Percent of Organizations Breached in 2014
(May 05, 2015, 23:00) (0 talkbacks)

eSecurityPlanet: QuinStreet Enterprise research outlines the scope of security challenges facing enterprises today.

How to install Shrew Soft IPsec VPN client on Linux
(May 05, 2015, 13:00) (0 talkbacks)

 xmodulo: There are many commercial VPN gateways available, which come with their own proprietary VPN client software.

Three effective solutions for Google Analytics Referral spam
(May 05, 2015, 12:00) (0 talkbacks)

 blackmoreops: In this post I will show three effective solutions for Google Analytics Referral spam.

HowTo Block Internet Explorer Browser With Squid Proxy Server on a Linux/Unix Server
(May 05, 2015, 10:00) (0 talkbacks)

Nixcraft: How can I block IE on a squid proxy server version 3.x?

Pixiewps, Reaver & Aircrack-ng Wireless Penetration Testing Tool Updates
(May 05, 2015, 09:00) (0 talkbacks)

Kali: Pixiewps is a tool used for offline brute forcing of WPS pins, while exploiting the low or non-existing entropy of some wireless access points also known as the pixie dust attack

Ubuntu still vulnerable to time-twiddling hack
(May 02, 2015, 14:00) (1 talkbacks)

 NetworkWorld: A security flaw in a common Unix software component remains unpatched in one of the most popular Linux distributions, more than a year after an official fix was published.

HashiCorp Debuts Open-Source Vault Project for Crypto Key Management
(May 01, 2015, 15:00) (0 talkbacks)

eWEEK: HashiCorp, the vendor behind popular Vagrant developer tool, makes a big jump into security with the open-source Vault project.

How to Securely Store Passwords and Api Keys Using Vault
(Apr 30, 2015, 08:00) (0 talkbacks)

 linoxide: Vault is a tool that is used to access secret information securely, it may be password, API key, certificate or anything else.

How to Manage Systemd Services and Units Using Systemctl in Linux
(Apr 29, 2015, 19:00) (1 talkbacks)

 tecmint: Systemctl is a systemd utility which is responsible for Controlling the systemd system and service manager

An Old Ubuntu Bug Lets Malicious Users Gain Sudo Access
(Apr 29, 2015, 14:00) (0 talkbacks)

 softpedia: It appears that there's a bug in Ubuntu distributions which lets malicious users to locally exploit sudo and gain access to the user's account without knowing their password.

Cavium adds OpenWRT support to Octeon III
(Apr 29, 2015, 13:00) (0 talkbacks)

 LinuxGizmos: Cavium announced OpenWRT Linux support for its Octeon III CN70/71XX SoCs, first available on a reference board and an Itus Networks "Shield" appliance.

The benefits of using RADIUS over LDAP
(Apr 29, 2015, 06:00) (0 talkbacks) If it's a web-based tool, support http authentication and you're done.

WordPress Quickly Patches Zero-Day Comment Flaw
(Apr 28, 2015, 19:00) (0 talkbacks)

eWEEK: The open-source WordPress content management system (CMS) on April 27 issued an emergency update, patching a new zero-day vulnerability that might have exposed users to risk.

BackBox Linux 4.2 Is a Complete Penetration Testing Distro Based on Ubuntu 14.04.2 LTS
(Apr 28, 2015, 06:00) (0 talkbacks)

 softpedia: BackBox Linux, a distribution based on Ubuntu 14.04.2 LTS, developed perform penetration tests and security assessments has just received a new update and is now ready for download.

Google Provides Detailed Analysis of GitHub Attack Traffic
(Apr 26, 2015, 10:00) (0 talkbacks)

ThreatPost: The high-profile DDoS attack against GitHub that went on for several days last month was the end result of an operation that included several phases and extensive testing and optimization by the attackers

How to encrypt a partition with DM-Crypt LUKS on Linux
(Apr 24, 2015, 23:00) (0 talkbacks)

 HowToForge: TrueCrypt is no more, and the purpose of this post is to show you straightforward partition encryption with dm-crypt luks.

How to Log in to Linux Desktop with Google Authenticator
(Apr 24, 2015, 07:00) (0 talkbacks)

MakeTechEasier: Have you ever wondered how to provide additional security to your Linux desktop?

IoT 'Security Hopscotch' Is No Game: Chris Roberts
(Apr 24, 2015, 06:00) (0 talkbacks)

eSecurityPlanet: Chris Roberts, in hot water after tweeting about a hack into a plane's WiFi system, describes another theoretical attack, this one against an Internet-connected appliance.

Receive news via our XML/RSS feed

LinuxToday Security Archives