Linux 4.3 rc3
Linux Top 3: Manjaro, Webconverger and Tails
Linux Today - Security
Incompetence, not Linux, is behind the XOR DDoS botnet
(Oct 06, 2015, 14:00) (1 talkbacks)
An OpenStack security primer
(Oct 06, 2015, 05:00) (0 talkbacks)
superuser: Meet the troubleshooters and firefighters of the OpenStack Security project and how you can get involved.
AV-TEST Laboratory Says Free Anti-Virus Apps on Linux Are the Worst
(Oct 05, 2015, 08:00) (0 talkbacks)
AV-TEST, an Independent IT-Security Institute, has just published an interesting analysis regarding the anti-virus solutions for the Linux platform provided right now
Motorola, you've let us down
(Oct 04, 2015, 06:00) (0 talkbacks)
ComputerWorld: When you've made your name as the company customers can count on for reliable Android upgrades, you can't drop the ball like this.
Qubes 3.0 Released
(Oct 02, 2015, 19:00) (0 talkbacks)
Qubes is now based on what we call Hypervisor Abstraction Layer (HAL), which decouples Qubes logic from the underlying hypervisor.
The issue with embedded Linux... and the solution
(Oct 02, 2015, 09:00) (0 talkbacks)
Tech Republic: A botnet spread by embedded Linux systems has been discovered, and the weakness can be traced back to seriously out-of-date firmware.
GitHub Improves Two-Factor Security With U2F
(Oct 02, 2015, 07:00) (0 talkbacks)
eWEEK: GitHub embraces the FIDO standard and aims to get Yubico U2F keys into as many developer hands as it can.
Stagefright 2 Exposes Another Billion Android Phones to Risk
(Oct 01, 2015, 11:00) (0 talkbacks)
eWEEK: The researcher who first disclosed the Android Stagefright security vulnerability at Black Hat 2015 is now revealing even more flaws that have yet to be patched.
Why a Linux-powered botnet shouldn't send you scurrying back to Windows
(Oct 01, 2015, 10:00) (0 talkbacks)
Tech Republic: The revelation that online attacks are being mounted using a large network of compromised Linux computers shouldn't deter you from trying out an open-source desktop.
The 101 of ELF Binaries on Linux: Understanding and Analysis
(Sep 29, 2015, 14:00) (0 talkbacks)
Linux-Audit: An extensive dive into ELF files: for security incident response, development and better understanding
Bromium Makes Open Source Security Research Tool Available
(Sep 29, 2015, 11:00) (0 talkbacks)
ITBusiness Edge: How the rest of the IT security vendor community responds to having open source security research tools more broadly available remains to be seen.
Keeping your Linux system safe
(Sep 25, 2015, 14:00) (0 talkbacks)
Opensource.com: There are some people we share files with who are affected by viruses and other malware.
Top Tips For Android Security
(Sep 25, 2015, 04:00) (0 talkbacks)
Datamation: Whenever someone asks me if a smartphone is truly secure, I find myself feeling vexed.
Mozilla Brings Instant Messaging to Firefox 41, Tracking Protection to Firefox 42
(Sep 24, 2015, 23:00) (0 talkbacks)
Datamation: As its market share dwindles toward irrelevance, Mozilla updates its flagship Firefox browser.
10 passwd command examples in Linux
(Sep 24, 2015, 15:00) (0 talkbacks)
LinuxTechi: As the name suggests, the passwd command is used to change the password of system users.
Get to Know the Elementary OS Freya Firewall Tool
(Sep 22, 2015, 13:00) (0 talkbacks)
Linux.com: Like most all Linux distributions, Freya works with iptables to lock down the platform.
Getting Started with UFW (Uncomplicated Firewall) on Ubuntu 15.04
(Sep 22, 2015, 11:00) (0 talkbacks)
HowToForge: UFW or Uncomplicated Firewall is an application to manage an iptables based firewall on Ubuntu
FOSS the Solution to Piracy Newspaper Says
(Sep 22, 2015, 08:00) (0 talkbacks)
FOSSforce: Recently in China, once considered something of a safe haven for piraters, a two year joint effort by Chinese police and the U.S. FBI led to 25 arrests and the seizure of $500 million in counterfeit Microsoft and Symantec software products
Netflix's Latest Open-Source Effort? Lemur an x.509 Cert Orchestration Framework
(Sep 22, 2015, 06:00) (0 talkbacks)
Public Key Infrastructure is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.
$15 plug-in crypto key supports Raspberry Pi and other Linux devices
(Sep 21, 2015, 05:00) (0 talkbacks)
How to Setup SSH Keys on a Linux System
(Sep 20, 2015, 14:00) (0 talkbacks)
FreedomPenguin: Allow me to let you in on a little secret - I have never used PuTTY or PuTTYGen. All of my key generation has always been done in the Linux command line.
WordPress 4.3.1 Includes Updates for XSS Vulnerability
(Sep 16, 2015, 23:00) (0 talkbacks)
eWEEK: Shahar Tal, research manager at Check Point, discusses vulnerabilities his team found and reported to WordPress, including a deep flaw that is now being patched.
Continually updated home security appliance runs Linux
(Sep 15, 2015, 11:00) (0 talkbacks)
LinuxGizmos: A startup is launching a "Cujo" home security appliance on Indiegogo starting at $49, that protects devices ranging from PCs to home automation gadgets.
How Debian and other open-source projects are making software more trustworthy
(Sep 14, 2015, 10:00) (0 talkbacks)
Hint: Reproducible builds.
Internet Bug Bounty Helps Secure Open Source and the Internet [VIDEO]
(Sep 11, 2015, 11:00) (0 talkbacks)
eSecurityPlanet: HackerOne co-founder and CTO Alex Rice discusses what the Internet Bug Bounty is all about.
Pro tip: Reboot Android into safe mode for easy malware removal
(Sep 11, 2015, 07:00) (0 talkbacks)
TechRepublic: If your Android device is infected with malware that's preventing you from using your device, Jack Wallen can help you boot into Android's safe mod
Skyport Names Former HP Security Chief as CEO
(Sep 10, 2015, 05:00) (0 talkbacks)
eWEEK: Linux server vendor hires Art Gilliland to lead its efforts
How to Install and run Kali Linux on any Android Smartphone
(Sep 09, 2015, 13:00) (2 talkbacks)
techworm: Kali Linux on Android smartphones and tablets allows researchers and pentesters to perform ” security checks” on things like cracking wep Wi-Fi passwords, finding vulnerabilities/bugs or cracking security on websites.
Linux Foundation Security Checklist: Have It Your Way
(Sep 08, 2015, 07:00) (0 talkbacks)
LinuxInsider: The Linux Foundation's recently published security checklist may draw more attention to best practices for protecting Linux workstations, even if IT pros do not embrace all of its recommendations.
How Debian Is Trying to Shut Down the CIA and Make Software Trustworthy Again
(Sep 08, 2015, 05:00) (0 talkbacks)
Motherboard: A software package reproducibly built should be byte for byte identical to the publicly-available package. Any difference would be evidence of tampering.