Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.


LinuxSecurity.com Feature Extras:

- Social engineering is the practice of learning and obtaining valuable information by exploiting human vulnerabilities. It is an art of deception that is considered to be vital for a penetration tester when there is a lack of information about the target that can be exploited.

- When you’re dealing with a security incident it’s essential you – and the rest of your team – not only have the skills they need to comprehensively deal with an issue, but also have a framework to support them as they approach it. This framework means they can focus purely on what they need to do, following a process that removes any vulnerabilities and threats in a proper way – so everyone who depends upon the software you protect can be confident that it’s secure and functioning properly.


  (Apr 5)
 

The traditional model of hacking a bank isn't so different from the old-fashioned method of robbing one. Thieves get in, get the goods, and get out. But one enterprising group of hackers targeting a Brazilian bank seems to have taken a more comprehensive and devious approach: One weekend afternoon, they rerouted all of the bank's online customers to perfectly reconstructed fakes of the bank's properties, where the marks obediently handed over their account information.

  (Apr 5)
 

Sir Tim Berners-Lee -- the inventor of the World Wide Web -- has won this year's A.M. Turing Award, which is frequently described as the "Nobel Prize of Computing," by the Association for Computing Machinery (ACM).

  (Apr 4)
 

Not so long ago, enterprising thieves who wanted to steal the entire contents of an ATM had to blow it up. Today, a more discreet sort of cash-machine burglar can walk away with an ATM's stash and leave behind only a tell-tale three-inch hole in its front panel.

  (Apr 5)
 

Opera Software today boasted that the number of new U.S. users of its namesake browser more than doubled days after Congress voted to repeal restrictions on broadband providers eager to sell customers' surfing history.

  (Apr 3)
 

Tuesday's congressional vote to repeal U.S. restrictions on broadband providers doesn't mean that online privacy is dead. Consumers will just have to pay for it.

  (Apr 6)
 

For privacy-minded Linux users, finding the best TrueCrypt alternative is now easier than ever as Jetico, developer of world-class data encryption software, has just updated BestCrypt Container Encryption to include Container Guard. This unique feature of Jetico's Linux file encryption protects container files from unauthorized or accidental commands, delivering added security and peace of mind.

  (Apr 7)
 

It's no secret that President Trump opposes net neutrality. He made that clear years ago with a characteristically bizarre Twitter attack against the internet's open access principle--an attack that vividly demonstrated his fundamental ignorance about how the internet actually works.

  (Apr 4)
 

President Donald Trump quietly signed a law Monday preventing privacy rules that were passed last year from coming into effect which prevented internet providers from selling their browsing data.A spokeswoman for the White House confirmed the signing.

  (Apr 3)
 

Recently inboxes have been hit by the so-called "airline phishing attack." It is a new take on an old phishing email. It uses multiple techniques to capture sensitive data and deploy an advanced persistent threat (APT).

  (Apr 3)
 

We are pleased to announce the eighth beta release of TorBirdy: TorBirdy 0.2.2. This release adds support for Thunderbird 52 and also features improved security configuration settings for Thunderbird. All users are encouraged to update.

  (Apr 7)
 

A broad array of Android phones are vulnerable to attacks that use booby-trapped Wi-Fi signals to achieve full device takeover, a researcher has demonstrated.

  (Apr 10)
 

spectrology is a Python-based audio steganography tool that can convert images to audio files with a corresponding spectrogram encoding, this allows you to hide hidden messages via images inside audio files.