Happy Monday fellow Linux geeks and Open Source enthusiasts! In this week's newsletter we explore how you are being tracked online and what happens to your data, and what you can do to keep from being tracked while online. We also review The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime by Jon DiMaggio, a book that helps readers understand the major players in the ongoing cyberwar, the different methods attackers use, as well as how experts analyze attacks, and examine the anatomy of a Linux fileless malware attack.

Have a question about or a comment on one of this week's articles?  Let's discuss! Read on to get the details on these critical topics.

Yours in Open Source,

Brittany Signature 150 Esm W150

You Are Tracked Online - Why? And How To Avoid Being Tracked Online

We explore how you are being tracked online and what happens to your data, and look at different ways to avoid being tracked online, such as using a datacenter proxy, rotating browsers and using helpful browser add-ons.
10.FingerPrint Locks Esm W241

Learn more about how to avoid being tracked online

 

Prepare Your Business for the Future of Cyberwar: A Review of The Art of Cyberwarfare

We review The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime by Jon DiMaggio, a book that helps readers understand the major players in the ongoing cyberwar, the different methods attackers use, as well as how experts analyze attacks. 
30.Lock Globe Motherboard Esm W234

Learn more about prepare your business for the future of cyberwar a review of the art of cyberwarfare

 

Fileless Malware on Linux: Anatomy of an Attack

What exactly is fileless malware and how does a fileless malware attack on Linux work? This article will provide you with answers to these questions by honing in on the anatomy of a Linux fileless malware attack - equipping you with the knowledge necessary to secure your systems and your data against this stealthy and malicious threat.
11.Locks IsometricPattern Esm W227

Learn more about fileless malware on linux