Linux security risks and threats

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Forum creates open environment for Linux flaws

    Developers of the Linux kernel have created a security mailing list this week as a method of predicting and protecting against future vulnerabilities in the open-source operating system's core code. 

  • Security patch for xpdf vulnerability

    Attackers could launch malicious code by way of a security hole in the program used to view .pdf files on many Linux systems. 

  • Open-source IPS testing tool released

    Free tool can gauge effectiveness, performance of IPS devices. 

  • Red Hat hoax: No smoking gun for Linux security

    Yesterday's Red Hat security hiccup may have been a little overblown, with one consultant calling the phishing scam so unauthentic that it was "obviously un-Red Hat." 

  • Red Hat hit by phishing scam

    Red Hat was forced to release a security warning for many of its Linux operating systems after an e-mail phishing scam was discovered that asked users to download a patch containing malicious code. Could this be the beginning of a string of attacks o... 

  • Security woes old (worms) and new (phishing)

    Phishing may have IT security administrators worried, but it's the old threats that will pose the most dangerous security risks during the rest of 2004, said Anton Chuvakin, senior security analyst for netForensics, an Edison, N.J.-based security inf... 

  • Denial-of-service flaw fixed in Linux kernel

    Gentoo fixes a vulnerability in the Linux kernel 2.6 series that could be exploited for a remote denial-of-service attack. 

  • Security has its privileges

    Maybe an innocent bystander can be excused for not seeing and stopping a crime about to happen, but IT security administrators can't. They need to keep their eyes open, according to Gijo Mathew, a security strategist for Computer Associates Internati... 

  • Mainstream means more malicious code for Linux

    It's not FUD, it's fact: Linux is every bit as susceptible to malicious code as Windows. Experts say the only difference between the two as attack vectors is the greater prevalence of Windows in enterprise data centers and on desktops. F-Secure Corp.... 

  • How to be a 'security warrior,' part 1

    In computer warfare, security admins must go into battle riding on a strong vehicle and armed with effective tools, according to security expert Anton Chuvakin. Fortunately, the security warrior who's protecting Linux has both.

    Chuvakin's securit...