Linux Security Week: April 11, 2022
Happy Monday fellow Linux geeks and Open Source enthusiasts! In this week's newsletter we explore how you are being tracked online and what happens to your data, and what you can do to keep from being tracked while online. We also review The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime by Jon DiMaggio, a book that helps readers understand the major players in the ongoing cyberwar, the different methods attackers use, as well as how experts analyze attacks, and examine the anatomy of a Linux fileless malware attack.
Have a question about or a comment on one of this week's articles? Let's discuss! Read on to get the details on these critical topics.
Yours in Open Source,
You Are Tracked Online - Why? And How To Avoid Being Tracked OnlineWe explore how you are being tracked online and what happens to your data, and look at different ways to avoid being tracked online, such as using a datacenter proxy, rotating browsers and using helpful browser add-ons. Learn more about how to avoid being tracked online
|
Prepare Your Business for the Future of Cyberwar: A Review of The Art of CyberwarfareWe review The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime by Jon DiMaggio, a book that helps readers understand the major players in the ongoing cyberwar, the different methods attackers use, as well as how experts analyze attacks.
|
Fileless Malware on Linux: Anatomy of an AttackWhat exactly is fileless malware and how does a fileless malware attack on Linux work? This article will provide you with answers to these questions by honing in on the anatomy of a Linux fileless malware attack - equipping you with the knowledge necessary to secure your systems and your data against this stealthy and malicious threat. Learn more about fileless malware on linux
|