Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines.

IBM Closes its $34 Billion Acquisition of Red Hat: A Monumental Moment for Open Source - In the tech giants largest deal ever and one of the biggest deals in US history, IBM closed its $34 billion acquisition of Red Hat on Tuesday July 9, 2019. Red Hat will now be a unit of IBMs hybrid cloud division and Red Hat CEO Jim Whitehurst will join IBMs senior management team. This event has significant meaning that extends beyond is monetary value: it is a testament to the power of Open Source and the opportunity it offers businesses of all sizes across all industries.

Guardian Digital Celebrates 20 Years of Revolutionizing Digital Security, Securing Email with Open Source - Pioneers of business email security for the past 20 years, Guardian Digital draws on the merits of Open Source coupled with expert engineering and unparalleled customer support.


  Canonical GitHub account hacked, Ubuntu source code safe (Jul 7)
 

The GitHub account of Canonical Ltd., the company behind the Ubuntu Linux distribution, was hacked on Saturday, July 6.

  Flaw in Video Conferencing App Could Have Given Hackers Immediate Access to Webcam Feeds (Jul 10)
 

Do you use Zoom for video chats? The company is now taking action to update its software only after a security researcher discovered several serious security vulnerabilities in the popular app.

  Over 1,300 Android Apps Caught Collecting Data Even If You Deny Permissions (Jul 9)
 

Smartphones are a goldmine of sensitive data, and modern apps work as diggers that continuously collect every possible information from your devices.

  What blockchain can and can't do for security (Jul 11)
 

Blockchain expert Rosa Shores agrees: Unless you have a data integrity problem, blockchain won't fix it. Try a distributed ledger instead. What are your thoughts on this? Comment below.

  Firefox to include tracker blocking report feature (Jul 9)
 

Mozilla has introduced a lot of tracker blocking protections into Firefox lately. Now, it is planning a new feature that will let you see how many online snoopers youve successfully evaded.

  Fears of AI-powered hacking are misplaced as criminals are doing fine without it (Jul 11)
 

Many people fear that AI-powered hacking would aid criminals in carrying out dangerous and costly cyberattacks. However, threat actors appear to be doing just fine without it. What is your opinion on this? Is AI-powered hacking a legitimate concern or are these fears misplaced? Comment below.

  Implementing Bug Bounty Programs: The Right and Wrong Approaches (Jul 12)
 

In this article, Threatpost catches up with David Baker, the chief security officer at Bugcrowd, about the future of bug bounty programs. While bug-bounty programs may seem like a cure-all solution for companies looking discover vulnerabilities in their systems more efficiently, the fact remains that a program could overwhelm a firms internal security team and cause other major headaches if implemented the wrong way.

  Bitpoint exchange loses $32 million worth of cryptocurrency in hot wallet hack (Jul 12)
 

Have you heard that Japanese cryptocurrency exchange Bitpoint has been hacked, resulting in the loss of $32 million worth of various digital currencies? The majority of funds lost (approximately $23 million) belonged to customers, while the rest were owned by the exchange.

  Following Court Decision, Amazon and Microsoft Set to Compete Over Military’s Cloud Computing Contract (Jul 15)
 

Have you been following the JEDI project? The $10 billion project has been full of controversy; however, the Pentagon still hopes to seal the deal with either Amazon or Microsoft next month.

  Explainer: What is post-quantum cryptography? (Jul 12)
 

Are you familiar with post-quantum cryptography? The race is on to create new ways to protect data and communications from the threat posed by super-powerful quantum computers. Get the details in this article.