Server Security - Page 6
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
A senior Linux kernel developer has pointed to an instance of what he calls a lax approach to security in the Linux kernel, citing the case of a serious vulnerability that is now more than a month old and is yet to be fixed.
There is a big different between compliance and security. The PCI-DSS (Payment Council Industry Data Security Standard) is the measure against which e-commerce security is measured and it is now in the process of gearing up for a major update at the end of the year.
With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise.
Apple has tapped a a noted hacker for its security team. Wired reported that the company has hired Kristin Paget, who was part of a small team of hackers who helped lock down Windows Vista for Microsoft before that OS shipped.
Rootkit.Linux.Snakso.a is designed to infect the Linux kernel version 2.6.32-5-amd64 and adds an iframe to all served web pages by the infected Linux server via the nginx proxy.
One of the more advanced rootkits to have hit town in recent memory has got security researchers across the globe in a tizz, even though it hasn
The Electronic Frontier Foundation (EFF) has released a new version of its HTTPS Everywhere browser extension for Firefox that now supports encryption on even more web sites. The US digital rights advocacy organisation says that version 3.0 of its Firefox add-on, which automatically redirects users to more secure HTTPS connections when accessing certain web pages, now supports an additional 1,500 sites, more than twice as many as previous stable releases.
It's no secret that Google's Android mobile operating system has had its share of security flaws. But what is less well-known is that the U.S. government's National Security Agency (NSA) is among the teams working to improve Android security.
Going once, going twice: The new NetWeird toolkit can be used to infect Apple OS X systems, converting Macs into zombies ready to do your botnet bidding, with prices starting at just $60.
If I've seemed a little bleary-eyed and inattentive this week you can blame Jim Fallows. Late on Tuesday night I read his post about gmail, which linked to Mat Honan's piece for Wired about the destruction of his (Honan's) digital life. I was then up most of the night implementing Jim's advice about improving my computer security. This is by no means the first warning Jim has issued.
Most Linux distributions have a significant focus on security. This does not mean they are necessarily ready for production out of the box. Tools like SELinux, excellent firewall options, and robust access controls can make Linux exceptionally secure.
They say the cloud is the future of computing. All your data and software programs, now known as web apps, will reside in the cloud and the computer itself will act as a
Bigger lesson learned from Flame: Multiple layers of security needed, so when one technology fails, a second or third may succeed
Life is full of trade-offs, and many times they are not palatable for every side. Such was the trade-off proposed by Fedora developers this week to solve the upcoming obstacle of UEFI secure booting on Windows 8-certified machines.
On March 9, 1977, Bill Joy compiled the first version of Berkeley Systems Distribution Unix, known as 1BSD. This version was just an add-on to an existing Unix, however. Two years later, he released 2BSD, which added two new programs from his repertoire: vi and the C Shell.
The Mac platform now finds itself in the crosshairs of malware developers along with Windows, but that isn't a reason to switch to Linux.
There are a few things you need to always remember when setting up a new Linux server. By default the root login is enabled for most systems. The best practice is to disable root login. Also, if you are transferring files via FTP, the best way to do this securely is via SFTP (not FTP).
Apple is taking steps to address the Java vulnerabilities behind the Flashback Trojan outbreak. But Java isn't the only attack vector for OS X -- and Apple users can no longer cling to the belief that Macs are virtually immune to malware.
The robots currently at work knocking around for your guessable password could easily be repurposed to guess your Unicode password currently known as your port knocking sequence, and quite likely have been already. Plus, we already have authpf(8) for network-level restrictions on access.