To:"Mike Swier" <mswier@YAHOO.COM>
Date: Thu, 26 Jan 2006 13:50:43 -0500 (EST)
From:"Security Pipeline Newsletter" <secured@techwire.com>
Subject: [SPN] Security Pipeline - 01.26.2006 - Getting A Grip On Linux Security Security Pipeline Newsletter | Getting A Grip On Linux Security | 01.26.2006
Security Pipeline Newsletter
www.SecurityPipeline.com
Thursday, January 26, 2006


In This Issue:
  • Editor's Note: Getting A Grip On Linux Security
  • Top Security News
        - Cybercrime Feared 3 Times More Than Physical Crime
        - Cyberstalking Law Targets E-mail, But Could Chill Bloggers
        - Kama Sutra Spoofs Digital Certificates
        - More News...
  • Editor's Picks
        - Annual Salary Survey: Where Do You Stand?
        - Security No Longer A Linux Deployment Hurdle
        - Cisco Security Alerts Serve As VoIP Wake-Up Call
        - More Picks...
  • Voting Booth: How Secure Is Linux
  • Get More Out Of Security Pipeline
  • Manage Your Newsletter Subscription


    ------- Advertisement -------------------
    Join InformationWeek for a FREE, live TechWebCast, The Why's, How's and What's of IP based systems for the call center - A practical guide for call center operations. Still unsure about why you should move to an IP call center system? Need help determining how best to move to an IP system? Unclear about what next steps to take? Attend this webcast for practical tools and answers to these questions that will help you and your team make the right decisions moving forward. Thursday, February 23, 2006 - 11:00 AM PT / 2:00 PM ET
    http://www.techweb.com/webcasts/ipbasedsystems022306

    -----------------------------------------

    Editor's Note: Getting A Grip On Linux Security

    For the past two weeks I've been running a poll at Security Pipeline to find out what your take is on Linux security.

    Right now the numbers show that a majority believes Linux security isn't bad at all, with 36% actually going so far as to describe it as extremely secure. If you haven't voted, cast your ballot this week as there'll be a new poll up come Monday.

    This week also brings a great article from contributing writer Jennifer Bosavage on the topic, and how security is really no longer a legitimate hurdle in keeping Linux from being planted within enterprises.

    But, as she points out, having great security doesn't always mean gaining market share as the small-to-midsize business wants the security the open-source platform offers, but they don't have the manpower to keep Linux running.

    You might also want to check out some other good Linux security articles:

    Why Linux Is More Secure Than Ever
    A tech expert discusses open source security, past and present, and how enterprises can ensure that their Linux environment is secured.

    Five Linux Security Myths You Can Live Without
    Ignorance may be bliss, but a smoking crater where your Linux workstation once sat is not. Here are some common Linux security myths that you're better off living without.

    And don't miss the new TechWeb Open Source Center that pull all the good info and news you need into one place when it comes to open source computing.

    And finally, if you are like most IT workers, you want to know where you stand; whether your career is on track; whether you deserve a raise. You can find that out and more by participating in InformationWeek's Annual Salary Survey.

    Not only that, you can win prizes and you can receive a 30+ page report that compares your salary and job satisfaction responses to those of your peers.

    Judy Mottl
    Editor, Security Pipeline
    judymottl@optonline.net
    www.SecurityPipeline.com


    Keep Getting This Newsletter
    Don't let future editions of Security Pipeline Newsletter go missing. Take a moment to add the newsletter's address to your anti-spam whitelist:

    secured@techwire.com

    If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.


    Top Security News

    Cybercrime Feared 3 Times More Than Physical Crime
    Recent poll data, indicating that data breaches and identity thievery are changing consumer behavior, have been confirmed by a report released Wednesday by IBM.

    Cyberstalking Law Targets E-Mail, But Could Chill Bloggers
    A new law against cyberstalking hasn't been tested in court yet, but both stalking victims' advocates and privacy advocates are critical of it.

    Kama Sutra Spoofs Digital Certificates
    The Kama Sutra worm can fool Windows into accepting a malicious ActiveX control by spoofing a digital signature, a security company says.

    FTC Says Cell Phone E-Mail Is Hoax
    The Federal Trade Commission (FTC) tried to calm jittery cell phone users by issuing an advisory last week telling them that they don't need to register their mobile number with the agency's Do-Not-Call Registry.

    Bill Gates' Spam Prediction Misses Target
    Still getting spam? Two years ago, Bill Gates predicted that spam would be a "solved" problem by now, a prognostication that, say most e-mail experts, was overly optimistic.

    Botnet Creator Pleads Guilty, Faces 25 Years
    A 20-year-old California man pleads guilty to federal charges that he created a botnet of several hundred thousand PCs, then rented out the network to spammers and criminals.


    Editor's Picks

    Annual Salary Survey: Where Do You Stand?
    Do you deserve a raise? Is your career on track? The editors of InformationWeek magazine invite you to participate in our 9th annual National IT Salary Survey.

    Security No Longer A Linux Deployment Hurdle
    For years, the debate against the Linux system was that its security was questionable. But as experts note, that's no longer an accurate assessment.

    Cisco Security Alerts Serve As VoIP Wake-Up Call
    Cisco Systems' revelation last week of two security alerts and fixes for CallManager, the processing component of its voice-over-IP technology, reminds us that while VoIP offers all sorts of benefits, there's no getting around its vulnerability as a software application.

    Microsoft Data Collection Troubles Some Users
    Microsoft monitors the security health of PCs running its OneCare Live security service by collecting data from users' computers, but some users think it's too much.

    Security Firm Offers Ad Space In Bug Report
    HexView and an anonymous security researcher it employs are planning to auction off ad space in an upcoming report on a Microsoft Excel vulnerability.

    Microsoft Apparently Bends On Source Code Licensing
    Microsoft has apparently conceded a bit on the issue of source code licensing.


    Voting Booth: How Secure Is Linux?

    Cast Your Vote Now!
    Given one expert's recent take on Linux security, what's your viewpoint about how secure open source technologies are today?


    Get More Out Of Security Pipeline

    Try Security Pipeline's RSS Feed
    Security Pipeline's content is available via RSS feed: Get RSS link. The feed is also auto-discoverable to many RSS readers from the Security Pipeline home page. Note: RSS feeds are not viewable in most Web browsers. You need an RSS reader, Web-based service, or plug-in to view RSS. Find out which RSS readers the Pipeline editors recommend.

    Check Out Our Security Product Finder
    In search of security products? See our brand new Product Finder for a directory of anti-malware products, access control solutions, monitoring tools, and more:
       - Anti-Spyware
       - Access Control
       - Usage Management and Monitoring

    Discover The Pipelines
    Security Pipeline is part of a large series of specialized IT sites from the TechWeb Network. Find out more about the Pipelines on the TechWeb Pipelines site. Every Pipeline site has its own newsletter. Give them a try!

    Recommend This Newsletter To A Friend
    Do you have a friend or colleague who might enjoy this newsletter? Please forward it to him or her and point out the subscription page.


    ------- Advertisement -------------------
    Join InformationWeek for a FREE, live TechWebCast, The Why's, How's and What's of IP based systems for the call center - A practical guide for call center operations. Still unsure about why you should move to an IP call center system? Need help determining how best to move to an IP system? Unclear about what next steps to take? Attend this webcast for practical tools and answers to these questions that will help you and your team make the right decisions moving forward. Thursday, February 23, 2006 - 11:00 AM PT / 2:00 PM ET
    http://www.techweb.com/webcasts/ipbasedsystems022306

    -----------------------------------------

    Manage Your Newsletter Subscription

    We take your privacy very seriously. Please review our Privacy Policy.

    Security Pipeline Newsletter
    A free service of Security Pipeline and the TechWeb Network.
    Copyright (c) 2004-2006 CMP Media LLC
    600 Community Drive
    Manhasset, NY 11030