Linux Security Week: April 12th, 2021

Advisories

Linux Security Week: April 12th, 2021

Thank you for reading our Linux Security Week newsletter! In this weekly newsletter, we strive to provide readers with a comprehensive overview of the week's most relevant open source security news. We want to provide you with the type of content you are interested in, and would love to hear your thoughts on this week's articles.

Today’s newsletter highlights our two most recent feature articles: Is Linux A More Secure Option Than Windows For Businesses? and Top Tips for Securing Your Linux System in 2021. We also examine various topics including privacy concerns surrounding the popular Rust programming language and Google's vested interest in open-source security. Happy Monday - and happy reading!

Yours in Open Source,

Brittany Day Signature


LinuxSecurity.com Feature Extras:

Is Linux A More Secure Option Than Windows For Businesses? - This article will examine why Linux is arguably the best choice for businesses looking for a flexible, cost-efficient, exceptionally secure OS. To help you weigh your options, we’ll explore how Linux compares to Windows in the level of privacy and protection against vulnerabilities and attacks it is able to offer all businesses and organizations.

Top Tips for Securing Your Linux System in 2021 - Here’s what you need to know to secure your Linux system against malware, rootkits and other dangerous attacks.


  Linux Lite 5.4 Released With Bug Fixes And UI Enhancements (Apr 7)
 

Linux Lite 5.4 is now available with full UEFI support, along with numerous bug fixes and UI enhancements. Learn what's new in Linux Lite 5.4 that makes this lightweight, user-friendly distro a better option than ever for users looking to make the transition from Windows to a Linux-based OS.

  Red Hat Launches RHEL Stream to Compete With the Rising Popularity of CentOS Stream (Apr 6)
 

CentOS stream is gaining poularity - and Red Hat has now launched RHEL Stream to compete with it.

  What's New in Fedora 34? 8 Reasons to Upgrade or Switch (Apr 5)
 

Considering Fedora? Now may be the time to switch. The new beta for Fedora 34 has been released with a selection of new features and improvements.

  Linux Mint will inform users about important security updates but not enforce them (Apr 5)
 

In an effort to improve security, Linux Mint has announced that it will inform users about important security updates - but not enforce them. Do you think Mint has made the right call?

  Most loved programming language Rust sparks privacy concerns (Apr 4)
 

Rust developers have repeatedly raised concerned about an unaddressed privacy issue over the last few years.

  KDE Plasma 5.21.4 Improves Support for the Fortinet SSL VPN, Plasma System Monitor App (Apr 8)
 

KDE Plasma 5.21.4 has been released with more bug fixes and improvements including better support for the Fortinet SSL VPN and improvements for the new Plasma System Monitor app.

  Google’s Vested Interest in Linux Security (Apr 8)
 

Google is now paying developers more money to work on securing their Linux kernels - a gesture that may well be the start of the companys bid to enforce a tighter grip on Open Source.

  How to Configure FirewallD in RHEL, CentOS and Fedora (Apr 6)
 

Learn how to securely configure FirewallD to manage your firewalls and improve the security of your network in this tutorial.

  Torvalds’ Bug Warning is a Lesson for Linux Users (Apr 9)
 

Linux does, occasionally, raise security concerns. While many users see it as the most secure, robust and versatile OS available, security precautions still have to be taken. Linus Torvalds' recent bug warning is a testament to the importance of taking a proactive, vigilant approach to security.

  23 Linux Server Security Tips and Best Practices (Apr 9)
 

Looking to improve the security of your Linux server to protect against vulnerabilities and attacks? Here's a checklist to live by.

  Tcpdump cheat sheet with examples (Apr 7)
 

Get started using tcpdump for network troubleshooting and monitoring with this comprehensive cheat sheet, which demonstrates different types of packet capture scenarios using actual tcpdump examples.

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.