Recently Perception Point Research team was identified a zero-day local privilege escalation vulnerability in the Linux kernel,the vulnerability has existed since 2012. This vulnerability has implications for approximately tens of millions of 32-...
Zero Day Flaw in Linux Kernal, Millions of Linux Servers Affected
Venom Vulnerability Allows an Attacker to Escape a Virtual Machine on Hypervisors
Venom security vulnerability(CVE-2015-3456) in the virtual floppy drive code used by computer virtualization platforms. This will be allows an attacker to escape a virtual machine on certain open source hyper-visors. This is very serious vulnerab...
Linux Australia Conference Server Database Hacked
The Linux Australia conference has revealed that one of its servers database was compromised. The personal data of conference attendees might have been exposed. Linux Australia's server held information on delegates to its popular annual conferen...
New Malware Targeting Linux and Unix Nginx Web Servers
New malware targeting Linux and Unix Nginx web servers, malware authors not only make user of far better network connections and more powerful servers than the average Windows PC, servers are also less likely to be updated on a regular basis and t...
May 2014 virus activity review from Doctor Web
In May 2014, Doctor Web security researchers discovered a record-high (compared to previous months) number of malicious programs for Linux. Also, during the second half of the month. Doctor Web's analysts continued their in-depth study of the co...
New Vulnerability on BMC, reveals server Admin Passwords
New vulnerability has been released by the CARI.net team regarding Supermicro’s implementation of IPMI/BMC for management. The vulnerability involves a plaintext password file available for download simply by connecting to the specific port, 4915...
Bug On GnuTLS Allows Hackers to Run Malicious Code
One more security vulnerability found on popular cryptographic Library GnuTLS. This bug leaves Linux vulnerable to remote code execution. GnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies arou...
Windows, Mac OS, and Linux Machines Targeted by Multi-Platform Botnet
Kaspersky security researchers had lifted the lid on a multi-platform botnet written in Java targeting machines running Windows, Mac OS, and Linux. Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Upda...
Linux Worm Targeting the Routers and camera Devices
Symantec has discovered a new Linux worm that appears to be engineered to target the “Internet of things”. The worm is capable of attacking a range of small, Internet-enabled devices in addition to traditional computers. Discovered a Linux worm cap...
Nessus On Linux
In last tutorial we saw how to use nessus on Windows. But as told earlier nessus is multi-platform vulnerability scanning/assessment tool. In this section we will cover how we can use nessus on Linux platform. The installation process in Linux is n...
TeamViewer 7 Finally Available For Linux
TeamViewer 7 Finally Available For Linux To Download TeamViewer 7 Click HereGood news for Linux users , TeamViewer 7 for Windows was released about a month ago now the Ver 7 is available for Linux though its a beta release. TeamViewer is an applica...
Hide Your Personal Files and Folders in Linux
The term “Linux” symbolizes security. Because of its never before witnessed high level of security, Linux is “the” operating system platform that is preferred by users globally, for whom making his system secure holds the utmost of priorities. Be i...
How to uninstall backtrack from hard disk
In this article i am gonna show you how to easily you can uninstall your backtrack series (3,4,5) from your hard-disk when you are using it with anotheroperating system like a windows 7 or windows xp.so let we start, we need one bootable windows 7 ...
Hide Your Personal Files and Folders In Linux
The term “Linux” symbolizes security. Because of its never before witnessed high level of security, Linux is “the” operating system platform that is preferred by users globally, for whom making his system secure holds the utmost of priorities. Be i...
Linux Networking
1 Introduction2 The OSI Networking Model2.1 Table 2-1: The Seven OSI Layers3 An Introduction to TCP/IP3.1 TCP Is a Connection-Oriented Protocol3.2 How TCP Establishes A Connection3.3 UDP, TCP's "Connectionless" Cousin3.4 TCP and UDP Ports3.5 The TC...
Socialize