Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.

Five Open-Source Projects AI Enthusiasts Might Want to Know About - Linux is arguably software developers favorite OS. Over 14,000 contributors have invested countless hours in developing the Linux Kernel. With Linux becoming increasingly popular due to its security and flexibility, developers who are interested in artificial intelligence (AI) may want to explore the possibilities within the Linux environment.

Open-Source Security Projects: Choosing a Brandable .com Domain - LinuxSecurity would like to thank NameEstate.com for contributing this article. The importance of an open-source security project name cant be overstated. A name serves as a first impression. Its your first chance to tell people who you are and what you do. An impactful name is the best way to convey your value and what you can offer to clients. So, when it comes to open source security projects, finding a name that shows you are capable, trustworthy, and secure can determine your reach and success.


  500 Chrome Extensions Caught Stealing Private Data of 1.7 Million Users (Feb 14)
 

Google removed 500 malicious Chrome extensions from its Web Store after they found to inject malicious ads and siphon off user browsing data to servers under the control of attackers.

  What Are Firefox Containers and Why Every Browser Needs Them (Feb 13)
 

Browser makers are working hard to build new privacy features that would protect users when surfing the web, and up to this point, Mozilla seems to be one of the innovators when it comes to such capabilities bundled with browsers.

  OpenVPN vs WireGuard: The Best VPN Protocol (Feb 14)
 

Are you looking for a secure open-source VPN? OpenVPN has almost become synonymous with VPN clients and rightly so. Its one of the fastest, most secure, and reliable VPN protocols out there. No matter which operating system you are on, most of the VPN clients have OpenVPN as their default tunneling protocol. Having said, there is talk of an OpenVPN alternative that claims to bring better performance and is much easier to set up.

  5 Cybersecurity Misconceptions Most Linux Users Still Believe In (Feb 11)
 

Linux has managed to build a reputation around being one of the most secure operating systems available today. But too many people tend to take its built-in security for granted.

  South Korea's government explores move from Windows to Linux desktop (Feb 11)
 

In what may prove to be the biggest migration from Windows to the Linux desktop, the South Korean government is looking into shifting from Windows 7 to a trio of Linux desktops.

  U.S. Officials Say Huawei Can Covertly Access Telecom Networks (Feb 12)
 

Huaweican covertly access mobile networks through back doors meant for law enforcement, the U.S. has told allies in a bid to show that the firm poses a security threat.

  Firefox 73 Released With Security Fixes, New DoH Provider, More (Feb 12)
 

Are you a Firefox user? Mozilla has released Firefox 73 to the Stable desktop channel for Windows, macOS, and Linux with bug fixes, new features, and security fixes.

  Google Chrome to start blocking downloads served via HTTP (Feb 10)
 

Are you a Google Chrome user? Have you heard that Google has announced a timetable for phasing out insecure file downloads in the Chrome browser, starting with desktop version 81 due out next month?

  A new senate bill would create a US data protection agency (Feb 13)
 

Europes data protection laws are some of the strictest in the world, and have long been a thorn in the side of the data-guzzling Silicon Valley tech giants since they colonized vast swathes of the internet.Two decades later, one Democratic senator wants to bring many of those concepts to the United States. What is your opinion on this bill?

  Open-Source Security in 2020: Myths and Facts (Feb 10)
 

Open-source software isnt a completely chaotic and breached wasteland of vulnerabilities. Its a global effort to make the development lifecycle faster.

  VPN Obfuscation (Everything You Need to Know – What It Is, How It Works, Why You Need It, and More) (Feb 17)
 

We all likely heard about VPN obfuscation at this point. Over the past years, a pretty noticeable number of VPN providers started using the term on their web pages.But what exactly is it? And why should you care about it?

  Google pulls 500 malicious Chrome extensions after researcher tip-off (Feb 17)
 

Google has abruptly pulled over 500 Chrome extensions from its Web Store that researchers discovered were stealing browsing data and executing click fraud and malvertising after installing themselves on the computers of millions of users.