Linux security risks and threats

Email Alerts

Register now to receive SearchEnterpriseLinux.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Security differences between Linux and Windows

     

  • Security woes old (worms) and new (phishing)

    Phishing may have IT security administrators worried, but it's the old threats that will pose the most dangerous security risks during the rest of 2004, said Anton Chuvakin, senior security analyst for netForensics, an Edison, N.J.-based security inf... 

  • Denial-of-service flaw fixed in Linux kernel

    Gentoo fixes a vulnerability in the Linux kernel 2.6 series that could be exploited for a remote denial-of-service attack. 

  • Security has its privileges

    Maybe an innocent bystander can be excused for not seeing and stopping a crime about to happen, but IT security administrators can't. They need to keep their eyes open, according to Gijo Mathew, a security strategist for Computer Associates Internati... 

  • Mainstream means more malicious code for Linux

    It's not FUD, it's fact: Linux is every bit as susceptible to malicious code as Windows. Experts say the only difference between the two as attack vectors is the greater prevalence of Windows in enterprise data centers and on desktops. F-Secure Corp.... 

  • As Linux becomes more popular, won't it be more susceptible to virus attacks?

     

  • How to be a 'security warrior,' part 1

    In computer warfare, security admins must go into battle riding on a strong vehicle and armed with effective tools, according to security expert Anton Chuvakin. Fortunately, the security warrior who's protecting Linux has both.

    Chuvakin's securit... 

  • Author: Hacking has its boundaries

    What evil lurks in the hearts of hackers? Joe Grand knows, and he believes that systems administrators should know, too. Those who can't think and act like a hacker are doomed to be outsmarted by one, says Grand, an author, electrical engineer and fo... 

  • Another security hole found in Linux kernel

    A second serious mremap vulnerability was discovered this week. New versions of the Linux kernel were released to address the problems. 

  • Right time, right spec: Deploying IPMI, part 2

    The Intelligent Platform Management Interface (IPMI) specification offers a good alternative to proprietary methods of server management, according to IPMI expert Steve Rokov. In Interview