Feature Articles - Page 2
Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
At last count, nearly half of all small businesses used cloud-based hosting and infrastructure services. SMBs are doing so because it allows them to use enterprise-grade technology at affordable prices. However, many small business owners and decision-makers don't fully appreciate the level of risk that comes with their cloud footprint. And that's a blind spot that can have significant bottom-line consequences.
Recently, the media has been covering many Internet break-ins, their reporters spinning tales of clever bandits who magically gain access to machines with a simple keystroke. In real life, however, it is rarely that simple. Cracking into a computer system requires planning. A cracker has to find a target machine, and then find out what ports the machine is listening on before a system can be compromised.
If your Linux system were a busy airport, the GNU C Library (glibc) would be the control tower that could give malicious actors free rein on your systems, like a pilot who hijacked an airplane. Recently, a severe vulnerability dubbed "Looney Tunables" (CVE-2023-4911) was found in this integral part of most Linux systems that provides basic system functions like file I/O, network, and memory access.
With cyber threats becoming alarmingly sophisticated, IT professionals constantly struggle to keep digital assets safe. It's not just about reacting to threats anymore; it's about building a security system that’s as dynamic and adaptable as the threats themselves. Linux, with its open-source, transparent framework, offers precisely that.
Data security is critical for running your business smoothly and earning customers’ trust. People provide information when purchasing products at e-commerce sites, signing up for services, giving feedback about experiences, and much more. However, many are becoming less open to sharing their data with companies unless they feel confident employees there will handle it responsibly.
Several critical vulnerabilities were found in the popular Squid caching proxy, including request/response smuggling in HTTP/1.1 and ICAP (CVE-2023-46846), denial of service in HTTP Digest Authentication (CVE-2023-46847), and denial of service in FTP (CVE-2023-46848).
Google is one of the most significant technology search engines in the world and an invaluable tool for users seeking to find information and answers to questions that they have efficiently. But now, Google has decided that it is time to test a new feature in its widely used Chrome browser by hiding IP addresses. By sending these connections from the browser through a proxy server first, the remote website only sees the IP address of the proxy server, not the device (phone, tablet, desktop, etc) from which the browser is being run.
Linux, renowned for its robust security features and flexibility, is a popular choice among enterprises for carrying out critical functions and tasks. In the evolving landscape of cybersecurity, managing a Linux environment requires a comprehensive approach encompassing security measures and effective compliance management.
With digitization conquering businesses, maintaining data and network security health standards and providing the best experience to clients and end users is essential. Today's networks are, for the most part, comprised of Linux and Windows-based environments. Businesses with data centers often prefer Linux networks, as they are good at scalability, security, customizations, consistency, and flexibility.
Docker containers provide a convenient way to deploy data management software. However, securing Docker containers that run sensitive data workloads requires careful configuration. Docker's lightweight container technology has become popular in current cybersecurity trends. Docker runs all applications, including databases, data pipelines, analytics tools, and other data management software.
Designing, developing, or managing a website requires a lot of effort. Fortunately, with modern open-source website builders and free online resources, even beginners can launch professional and secure websites. This article will discuss the basics of creating a website, including the technologies involved, best practices, and the best network security toolkits to implement.
Network applications are most effective at communication when following the client-server model. Programming these services allows organizations to configure codes to meet business needs.
Understanding and utilizing software security has become paramount in today's interconnected digital landscape. Computer security news constantly warns of newly evolving network security threats, which means that organizations must implement the most comprehensive testing and security practices to ensure employees are secure. With an open-source nature and robust capabilities, Linux has the ideal cloud security framework for conducting thorough software security patching and testing.
Linux proxy servers are essential for individuals and organizations looking to enhance their online privacy, data, network security, and browsing experience. In this comprehensive article, we will explore the concept of proxy servers, discuss the advantages of using a Linux proxy server, dive into the risks associated with their usage, highlight Squid as an efficient and user-friendly Linux proxy server, and provide step-by-step instructions on how to set up the HTTP proxy on Linux.
When dealing with a system crash due to a kernel panic, it is crucial to leave the “panic” to the kernel and focus on troubleshooting in a calm, structured way. This approach will help you get things running smoothly in less time and minimize stress and headaches in the process.
In the ever-evolving landscape of cyber and network security threats, staying one step ahead of malicious actors is an ongoing challenge for organizations. As technology advances, so too do cybercriminals’ tactics. In this high-stakes digital battlefield, Linux Endpoint Detection and Response (EDR) emerges as a knight in shining armor for modern cybersecurity strategies. Let’s examine what Linux EDR is, how it can help fortify your Linux devices against today’s sophisticated cybersecurity vulnerabilities, and some excellent EDR software and network security toolkits available to Linux users.
Do you love Linux because of its user-friendly, exceptionally secure, heavy-duty, and open-source features that are easy to customize and maintain? If so, you’re not alone. It is no wonder Linux has captured the lion's share of the IT market.
LinuxSecurity.com has been using the open-source Joomla Content Management System (CMS) and Hypertext Preprocessor (PHP) scripting language for nearly three decades and recently migrated to the latest versions, Joomla 4 and PHP 8. This allows LinuxSecurity to use new features and optimizations to provide visitors with an enhanced user experience. We’ve decided to pull back the curtain on our experience with the migration to Joomla 4 and PHP 8 to give users planning to migrate their websites insight into the lessons we learned.
Will the pre-pandemic norm of exclusively in-office work ever return? The answer is a resounding no. What was coined as the new normal in 2020 has seamlessly transitioned into the normal of 2023 and beyond. Research from Gartner® forecasts that "almost 50% of employees will continue to work remotely post COVID-19."
In August 1991, Linus Torvalds, a student at the University of Helsinki, created an operating system that could be a free, open-source alternative to MINIX. He said about starting Linux, "Hello everybody out there using minix - I'm doing a (free) operating system (just a hobby, won't be big and professional like gnu)..."
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.