Thank you for reading the weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines. Feature Extras:

- In this interview, Dave Wreski discusses Guardian Digital's highly effective email security solutions and the myriad advantages of investing in these solutions to secure your email.

- Social engineering is the practice of learning and obtaining valuable information by exploiting human vulnerabilities. It is an art of deception that is considered to be vital for a penetration tester when there is a lack of information about the target that can be exploited.

  (May 11)

A mobile user is 18 times more likely to be exposed to a phishing attempt than to malware, according to a new report on techniques and technologies that try to get a user to be an accomplice in their own victimization.

  Linux Kernel Hardens Sound Drivers Against Spectre V1 Vulnerability (May 6)

As part of fixes landing for the Linux kernel sound drivers, several sound drivers were hardened against Spectre Variant One.

  (May 6)

Multiple previously unconnected Chinese threat actors behind numerous cyber campaigns aimed at organizations in the United States, Japan, and other countries over the past several years are actually operating under the control of the country's state intelligence apparatus.

  Most Industrial Networks Vulnerable to Attack (May 7)

Despite the fact that so many aspects of a modern society rely on the proper and uninterrupted operations of critical infrastructure, security flaws across many industrial control systems (ICSs) are largely vulnerable to cyber-attacks.

  (May 7)

It may have escaped the notice of prospective buyers, but cars have recently become a bit of a target for security researchers.

  Online voting is impossible to secure. So why are some governments using it? (May 9)

Dr. Vanessa Teague is one frustrated cryptographer.A researcher at the University of Melbourne in Australia, Teague has twice demonstrated massive security flaws in the online voting systems used in state elections in Australia -- including one of the largest deployments of online voting ever, the 2015 New South Wales (NSW) state election, with 280,000 votes cast online.

  Trial set for Latvian accused of running malware operation (May 8)

Jury selection is set to begin in Virginia in the trial of a Latvian man accused of running a hacking operation offering malware products and services to cybercriminals.

  Small Firms Up to 20 Times More Likely to be Breached (May 9)

UK small businesses are up to 20 times more likely to suffer damaging data breaches than their larger counterparts, according to new data from Terbium Labs.

  Equifax Update Clarifies Breach Details to SEC (May 8)

Under-fire credit reporting agency Equifax has released updated figures clarifying the types and volumes of data stolen in its massive 2017 breach.

  Former Iranian Hacker Exposes Cyber-Efforts (May 10)

The Islamic Republic of Iran commonly responds to sanctions with offensive cyber-campaigns. Since at least 2009, Iran has relied on cyber-attacks to achieve many of its policy goals.

  (May 10)

Around 40% of organizations ignore critical security issues when they don't know how to fix them, or don't have the time to address them.

  Report: More Breaches Despite Increasing Security Budgets (May 11)

Despite companies increasing their security budgets and investing a fortune in the best cybersecurity tools, organizations today are subject to more successful breaches than ever before – with five million data records lost or stolen every day, according to the fifth annual Cyberthreat Defense Report from CyberEdge group and sponsored by Gigamon.