If you've been involved with information security for more than a decade, you've probably heard of Rootkit Hunter or rkhunter, a software whose primary goal is to discover malware and local exploits on Unix and Linux.
Attacks exploiting the Shellshock vulnerability (actually, vulnerabilities) are popping up daily, but while Shellshock attacks on web apps have been the most documented and discussed, attacks via other attack surfaces are possible, too.
After researcher Jonathan Hall's claims that a group of hackers has been exploiting the Bash Shellshock vulnerability to compromise a number of servers belonging to Yahoo, Lycos and Winzip made headlines yesterday, the companies in question were forced to address the fact.
This 525-page book is for anyone who wants to support computer peripherals under the Linux operating system or who wants to develop new hardware and run it under Linux.
Apple has finally released a security update for OS X that will close up the critical remote code execution Shellshock bug found in the GNU Bash UNIX shell.