Server Security - Page 8.2
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Thanks to Ars Technica and H-online.com, we now have intimate details of the Anonymous attack against security research company HBGary. There are no surprises in how the attacks where carried out, but we can draw many morals from the story, even if we've heard them time and time before.
Oh my God! There are security holes in Ubuntu 10.04! The sky is falling! Bill Gates is the maker of the one true operating system; forgive us Bill for we have worshiped at the feet of false Penguin idols. Oh please, give me a break!
According to the RSA 2011 Cybercrime Trends Report, the number one trend this year will be mobile device malware and the associated exploitation of mobile smart devices to commit fraud. The explosive growth of mobile smart devices as general purpose
At the ShmooCon hacker conference, security expert Jon Larimer from IBM's X-Force team demonstrated that Linux is far from immune from attacks via USB storage devices: during his presentation, the expert obtained access to a locked Linux system using a specially crafted USB flash drive, ...
The WordPress.org development team has released version 3.0.5 of its open source blogging and publishing platform, a maintenance and security update that addresses two vulnerabilities; these could have allowed a Contributor- or Author-level user to gain further access to the site.
Routing issues, slow network applications, DNS resolution problems -- a network administrator has to deal with a host of network nuisances on a daily basis. How do you survive when you're constantly under the gun to fix the problems? Like any other professional, you need a solid set of tools.
Half of U.S. government Web sites are vulnerable to commonplace DNS attacks because they haven't deployed a new authentication mechanism that was mandated in 2008, a new study shows.
Linus Torvalds is starting 2011 off with a bang with the release of the 2.6.37 Linux kernel. The new kernel is the first release since 2.6.36 debuted in October. The goal of the new 2.6.37 kernel is to provide developers with improved Linux performance, security and scalability.
Somehow technology seems to evolve at a rapid pace, even when the standards bodies that help define it do not. Consider that most of today's websites are built on HTML4, a standard that was introduced in 1997. In the thirteen years since, the way we use the Web has changed dramatically, even if the underlying standard has not.
How was it that a loosely-coupled group of cyber-protestors could launch -- with varying degrees of success -- targeted distributed denial-of-service (DDoS) attacks against sites such as MasterCard, PayPal, PostFinance, and the website belonging to a Swedish prosecutor?
Thanks to Mehran for sending this in. OpenBSD IPSEC stack has backdoor and due to that's first open source implementation of ipsec, some OSes have the same piece of code! Since we had the first IPSEC stack available for free, large parts of the code are now found in many other projects/products. Over 10 years, the IPSEC code has gone through many changes and fixes, so it is unclear what the true impact of these allegations are."
The WordPress development team has released version 3.0.2 of their popular open source blogging and publishing platform, a maintenance and security update for the 3.0.x branch of WordPress. According to the developers, the update addresses a security issue that could allow a malicious Author-level user to gain further access to a site.
In a previous tip, we looked at setting up an OpenVPN server. Now, I'll take you through the setup of a Linux OpenVPN client. The Linux client will be based on CentOS 5 using OpenVPN 2.0.9.
Protecting databases is hardly an easy task, but it is often the attacks that go after the simplest vulnerabilities that are most successful. Enterprises that stick to the basics will generate the most bang for their database security bucks.
Nearly twelve weeks after the release of Linux 2.6.35, Linus Torvalds has released Linux 2.6.36. The new version of the Linux kernel includes various performance enhancements and updates, the AppArmor security extension and support for the KDB-KMS-Debug-Shell. Other changes include a new Out-of-Memory (OOM) killer and kernel thread improvements.
The open-source Linux operating system contains a serious security flaw that can be exploited to gain superuser rights on a target system.
Phishing attacks have risen sharply even though spam has declined to its lowest level since 2008, a new report reveals.
The Domain Name System (DNS) plays a critical part in Internet communications, as it's used to translate a human-readable computer hostname into an IP address -- such as searchsecurity.co.uk to 65.214.43.49 -- so that it can be understood and used by networking equipment, computers and software programs.
After some days with the latest Ubuntu Linux desktop release, I was planning to devote a few graphs to extolling its many virtues.
As Oracle prepares to dump a passel of 81 security fixes on its user base -- including seven critical patch updates (CPUs) for its database product -- many database administrators are preparing to patch their Oracle database platforms accordingly.
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.