Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.


LinuxSecurity.com Feature Extras:

Essential tools for hardening and securing Unix based Environments - System administrators are aware as how important their systems security is, not just the runtime of their servers. Intruders, spammers, DDOS attack, crackers, are all out there trying to get into people's computers, servers and everywhere they can lay hands on and interrupt the normal runtime of services.

Securing a Linux Web Server - With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise. While specific configurations vary wildly due to environments or specific use, there are various general steps that can be taken to insure basic security considerations are in place.


  WikiLeaks: ISPs to hand over copyright infringer details under TPP (Oct 12)
 

The Trans-Pacific Partnership (TPP) will force internet service providers (ISPs) to give up the details of copyright infringers so that rights holders can protect and enforce their copyright through criminal and civil means with few limitations, according to the intellectual property chapter released by WikiLeaks over the weekend.

  (Oct 13)
 

California continued its long-standing tradition for forward-thinking privacy laws today when Governor Jerry Brown signed a sweeping law protecting digital privacy rights.

  (Oct 15)
 

USB sticks have long been a mechanism for delivering malware to unsuspecting computer users. A booby-trapped flash drive, for instance, was the means by which the US and Israel reportedly infected Iran's Natanz uranium enrichment facility with the Stuxnet worm. And, in case anyone thought USB stick attacks had lost their novelty, last year's Bad USB proof-of-concept exploit delivered a highly programmable attack platform that can't be detected by today's defenses.

  Breaking Diffie-Hellman with Massive Precomputation (Again) (Oct 16)
 

The Internet is abuzz with this blog post and paper, speculating that the NSA is breaking the Diffie-Hellman key-exchange protocol in the wild through massive precomputation.

  AV-TEST tests Linux security solutions against Linux and Windows threats (Oct 12)
 

The recent tests on Linux security solutions by AV-Test Lab indicate a worrisome situation