Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.

LinuxSecurity.com Feature Extras:

Security Highlights from Defcon 26 - Defcon 26 provided individuals and organizations with valuable tips and insight on security and the latest and most effective defenses. Here are some security-related highlights from the event.

Guard Your Email Accounts Against Today's Most Dangerous Threats - Cyber threats are more sophisticated and dangerous than ever before! Are you securing your email accounts with a solution that is capable of preventing these advanced attacks?


  US government releases post-mortem report on Equifax hack (Sep 10)
 

The Government Accountability Office (GAO) has published a report to detail how the Equifax hack went down and how the credit reporting company answered during and after the incident.

  (Sep 9)
 

On September 6, the US Department of Justice formally charged a North Korean programmer for some of the biggest cyber-attacks in recent years.

  (Sep 10)
 

Companies that contribute to open source software and use it in their own IT systems and applications can gain a competitive advantage--even though they may be helping their competitors in the short run.

  (Sep 11)
 

There's no doubt that widespread adoption of the cloud has enabled collaboration on a much greater scale, driving innovation and creativity. Distributed workforces can work harmoniously, IT departments can offload expensive hardware and maintenance costs, and organizations can benefit from the latest developments in software tools. But inevitably there's a catch.

  California bill regulates IoT for first time in US (Sep 13)
 

California looks set to regulate IoT devices, becoming the first US state to do so and beating the Federal Government to the post.

  (Sep 12)
 

Whether you're a developer building websites or internal applications, or an administrator building the infrastructure to back them, your job doesn't stop once they're up and running. Machine failure, releases containing bugs, and growth in usage can all lead to problems that need to be dealt with. To detect them, you need monitoring.

  4 Practical Measures to Improve Election Security Now (Sep 12)
 

In the past, a midterm election season would pass without much fanfare. These have been torpid affairs with low voter turnout and few big-ticket issues, which historically has meant incumbents rather predictably hold their seats.

  Russian National Extradited for 2014 JP Morgan Hack (Sep 11)
 

Georgian officials have extradited Russian citizen Andrei Tyurin to the United States, where he will face charges related to a wide-ranging hacking campaign that targeted the US financial sector and included the 2014 breach of JP Morgan Chase.

  (Sep 13)
 

The website of Edinburgh University was still down at the time of writing after the institution suffered a major cyber-attack during its Freshers' Week.

  ICO Swamped with GDPR Breach Over-Reporting (Sep 14)
 

The ICO has received 500 calls each week to its breach reporting helpline since the GDPR came into force in May, but around a third of these don't meet the minimum threshold, according to the deputy commissioner of operations.

  (Sep 11)
 

In the year since the "shock and awe" of WannaCry and NotPetya – outbreaks that spread globally in a matter of hours – ransomware has been making a lot less noise.

  (Sep 14)
 

Nation-states and criminal gangs often get the blame for cyber attacks against universities, but a new analysis of campaigns against the education sector suggests that students -- or even staff -- could be perpetrators of many of these attacks.