Linux Security Week: December 2nd, 2019

    Date02 Dec 2019
    97
    Posted ByLinuxSecurity Advisories
    Linux Security Week Newsletter

    Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.

    Linux Kernel Security in a Nutshell: How to Secure Your Linux System - The Linux kernel is the core component of the Linux operating system, maintaining complete control over everything in the system. It is the interface between applications and data processing at the hardware level, connecting the system hardware to the application software. The kernel manages input/output requests from software, memory, processes, peripherals and security, among other hefty responsibilities. Needless to say, the Linux kernel is pretty important.

    Servers Running Linux May Get Riskier for Enterprises Next Year - The LinuxSecurity team thanksHoracio Zambrano for contributing this article. Enterprises using Linux for their cloud or data center servers may be faced with a larger threat from advanced security attackers in the near future. Based on the Linux Foundations estimates back in 2014, 75% of enterprises reported using Linux for the cloud and 79% for application deployments.


     Latest Kali Linux OS Added Windows-Style Undercover Theme for Hackers (Nov 27)
     

    Are you a Kali Linux user? Have you heard that the Kali Linux OS has added a Windows-style undercover theme for hackers, penetration testers and cybersecurity researchers? Learn more:

     Linux Kernel 5.4 Officially Released with exFAT Support, Kernel Lockdown Feature (Nov 25)
     

    Linus Torvalds announced today the general availability of the Linux 5.4 kernel series, a major release that adds numerous new features, stronger security, and updated drivers for better hardware support. Learn more in an informative Softpedia News article:

     IBM urges review of Australia’s anti-encryption laws (Nov 26)
     

    IBM has spoken out against Australias controversial anti-encryption laws, claiming they undermine previous work to strengthen the countrys defenses.The vendor giant has urged the federal government to review the Telecommunications (Assistance and Access) Act 2018, which passed last year and effectively compels technology companies to build backdoors into their encrypted data. What is your opinion on these anti-encryption laws? Learn more:

     GNU Linux-Libre 5.4 Kernel Released for Those Seeking 100% Freedom for Their PCs (Nov 26)
     

    The GNU Linux-libre community announced today the release and general availability of the GNU Linux-libre 5.4 kernel for those seeking 100% freedom for their personal computers.The GNU Linux-libre kernel promises 100% freedom for your personal computer by not providing any proprietary drivers, firmware, or other code that is not licensed under one of the many Open Source licenses. Learn more:

     EU raises eyebrows at possible US encryption ban (Nov 27)
     

    The growing battle over end-to-end encryption took another turn last week, when EU officials warned that they may not take kindly to a US encryption ban or insertion of crypto backdoor technology. What is your opinion on this issue? We are in favor of strong encryption. Learn more:

     Five Senators Join the Fight to Learn Just How Bad Ring Really Is (Nov 25)
     

    Amid months of damaging investigative reporting and pressure by advocacy groups like EFF, senators are finally joining the fight to learn just how invasive and harmful Amazons Ring cameras are to the privacy of people in their vicinity. What are your thoughts on Ring cameras? Learn more in an interesting EFF article:

     Cybersecurity: The web has a padlock problem - and your internet safety is at risk (Nov 28)
     

    We've been taught to look out for that little padlock to ensure a website is secure. But it's dangerous to rely on just one detail. Learn more:

     India reportedly wants unrestricted access to non-personal data (Nov 28)
     

    The Indian government is planning to gain unrestricted access to non-personal data of people in India, according to a report by Tech2 .Non-personal data is anonymized data which cant be traced back to identify a person. For example, weather sensors without a specific location or e-Commerce data without personal identification. What are your thoughts on this initiative and its privacy implications? Learn more in a great The Next Web article:

     Using WPScan to find WordPress vulnerabilities on your website (Nov 29)
     

    Are you a security-conscious WordPress user? WPScan is an open source WordPress security scanner. You can use it to scan your WordPress website for known vulnerabilities within the WordPress core, as well as popular WordPress plugins and themes. Learn more about WPScan and how you can use this tool to improve your security in WordPress in an informative Security Boulevard article:

     Pressure mounts for federal privacy law with second bill (Nov 29)
     

    Pressure is gathering for a federal privacy law in the US with the introduction of a second bill that would protect consumer data. The Consumer Online Privacy Rights Act from Washington Senator Maria Cantwell not only outlines strict privacy and security rules, but also establishes a dedicated FTC office to enforce them. Cantwell also pointed out in her Bill announcement that it defines privacy as a right in federal law. How do you feel about this bill? Learn more:

     61% of malicious ads target Windows users (Dec 2)
     

    Did you know that Linux is the least targeted OS by malicious ads, accounting for only 0.3% of all malicious ads recorded in a recent study? Most malvertising campaigns (malicious ads) target Windows users, according to statistics shared last week by cyber-security firm Devcon.Chrome OS is the second most targeted, while Linux is the least. Learn more:

     Chinese companies want to help shape global facial recognition standards (Dec 2)
     

    The use of facial recognition technology is continuing to expand , despite concerns about its accuracy and fairness and about how it could be used by governments to spy on people. These concerns have been heightened following a report by the Financial Times which shows that Chinese groups have a significant influence in shaping international standards regarding the technology. Learn more:

    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"65","type":"x","order":"1","pct":57.52,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":13.27,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"33","type":"x","order":"3","pct":29.2,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.