Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.

LinuxSecurity.com Feature Extras:

- Social engineering is the practice of learning and obtaining valuable information by exploiting human vulnerabilities. It is an art of deception that is considered to be vital for a penetration tester when there is a lack of information about the target that can be exploited.

- When you’re dealing with a security incident it’s essential you – and the rest of your team – not only have the skills they need to comprehensively deal with an issue, but also have a framework to support them as they approach it. This framework means they can focus purely on what they need to do, following a process that removes any vulnerabilities and threats in a proper way – so everyone who depends upon the software you protect can be confident that it’s secure and functioning properly.


  (Sep 5)
 

Microsoft has released its long-awaited cloud-based bug detection tool, previously code-named "Project Springfield." The Windows version became generally available, and a new Linux version became available as a preview last week.

  (Sep 6)
 

With Bitcoin nearing a valuation of $4,500 scammers are trying all kinds of tricks to steal people's valuable cryptocurrencies, including just asking people to give them away.

  (Sep 5)
 

In the internet era, consumers seem increasingly resigned to giving up fundamental aspects of their privacy for convenience in using their phones and computers, and have grudgingly accepted that being monitored by corporations and even governments is just a fact of modern life.

  (Sep 5)
 

Three groups of hackers have wiped around 26,000 MongoDB databases over the weekend and demanded victims to pay about $650 to have them restored.

  (Sep 6)
 

Tor Project has announced measures to improve secure web browsing for mobile devices.The Tor Project, a non-profit which develops and maintains the Tor network for anonymized browsing and as a way to skirt censorship-heavy government controls, keeps its eyes on the state of censorship worldwide.

  (Sep 6)
 

Rockstar CISOs are expected to land salary offers of $241,000 in 2018, putting them in the 95th percentile for CISO salary ranges, according to Robert Half Technology's 2018 Salary Guide released this week.

  (Sep 11)
 

Peeved about previous vulnerability disclosures experiences with D-Link, a security researcher has publicly disclosed 10 zero-day vulnerabilities in D-Link DIR 850L wireless AC1200 dual-band gigabit cloud routers.

  (Sep 11)
 

Virginia's State Board of Elections has decided its current generation of electronic voting machines is potentially vulnerable, and wants them replaced in time for the gubernatorial election due on November 7th, 2017.

  (Sep 11)
 

Microsoft surprised the technology world last year when it announced that users will be able to run native Linux applications in Windows 10 without virtualization. While this feature is meant to help developers, researchers believe it could be abused by attackers to hide malware from security products.