Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.

LinuxSecurity.com Feature Extras:

Essential tools for hardening and securing Unix based Environments - System administrators are aware as how important their systems security is, not just the runtime of their servers. Intruders, spammers, DDOS attack, crackers, are all out there trying to get into people's computers, servers and everywhere they can lay hands on and interrupt the normal runtime of services.

Securing a Linux Web Server - With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise. While specific configurations vary wildly due to environments or specific use, there are various general steps that can be taken to insure basic security considerations are in place.


(Sep 22)

I recently started an open source project (HoneyTags) with the goal of creating special callback tags that can be embedded into files, an active defense technique popularly known as honey docs. In theory, honey docs will then callback to a main server with the time, IP address, and user-agent of the actor who opened the file.

How come MCS Confinement is not working in SELinux even in enforcing mode? (Sep 22)

MCS separation is a key feature in sVirt technology.We currently use it for separation of our Virtual machines using libvirt to launch vms with different MCS labels. SELinux sandbox relies on it to separate out its sandboxes. OpenShift relies on this technology for separating users, and now docker uses it to separate containers.

Thanks to encryption, we may never spot space aliens says Edward Snowden (Sep 21)

The anti-encryption lobby has just got a new fan. After the government agencies, who are against encryption for obvious reasons, Edward Snowden has spoken out against encryption albeit for a different reason altogether.

(Sep 24)

When hackers steal your password, you change it. When hackers steal your fingerprints, they've got an unchangeable credential that lets them spoof your identity for life. When they steal 5.6 million of those irrevocable biometric identifiers from U.S. federal employees--many with secret clearances--well, that's very bad.