Linux Security Week: March 13th, 2017
Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.
LinuxSecurity.com Feature Extras:
Social Engineering Methods for Penetration Testing - Social engineering is the practice of learning and obtaining valuable information by exploiting human vulnerabilities. It is an art of deception that is considered to be vital for a penetration tester when there is a lack of information about the target that can be exploited.
Putting Infosec Principles into Practice - When you’re dealing with a security incident it’s essential you – and the rest of your team – not only have the skills they need to comprehensively deal with an issue, but also have a framework to support them as they approach it. This framework means they can focus purely on what they need to do, following a process that removes any vulnerabilities and threats in a proper way – so everyone who depends upon the software you protect can be confident that it’s secure and functioning properly.
WikiLeaks publishes docs from what it says is trove of CIA hacking tools (Mar 8) | ||
|
||
Google's ‘SHA-1 Countdown Clock' Could Undermine Enterprise Security (Mar 8) | ||
|
||
Wikileaks Just Dumped a Cache of Information on Alleged CIA Hacking Tools (Mar 7) | ||
|
||
The Border Patrol can take your password. Now what? (Mar 6) | ||
|
||
HackerOne offers bug bounty service for free to open-source projects (Mar 6) | ||
|
||
Put down the coffee, stop slacking your app chaps or whatever – and patch Wordpress (Mar 7) | ||
|
||
Hackers exploit Apache Struts vulnerability to compromise corporate web servers (Mar 9) | ||
|
||
Critical vulnerability under "massive" attack imperils high-impact sites (Mar 10) | ||
|
||
An insecure mess: How flawed JavaScript is turning web into a hacker's playground (Mar 10) | ||
|
||
Google tries to beat AWS at cloud security (Mar 10) | ||
|
||
Operation Rosehub patches Java vulnerabilities in open source projects (Mar 13) | ||
|