LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: December 12th, 2014
Linux Security Week: December 9th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Latest News
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Linux Kernel Exploit Goes Public  09 December 2010 
Source: eWeek - Posted by Anthony Pell   
A security researcher has posted an exploit for the Linux on the Full Disclosure mailing list that utilizes three different bugs to permit an attacker to get root access.
 
WikiLeaks live Q&A with Geoff Elliott and Caroline Overington  08 December 2010 
Source: The Australian - Posted by Anthony Pell   
HOURS before his arrest Julian Assange sent an opinion piece to The Australian, comparing himself to Sir Keith Murdoch, who famously spoke truth to power during the Gallipoli campaign.
 
Operation Payback: WikiLeaks Avenged by Hacktivists  08 December 2010 
Source: Network World - Posted by Anthony Pell   
WikiLeaks has been experiencing some issues lately ranging from having its Web hosting services shutdown to having its accounts frozen and the flow of money cut off. Some cheer those actions, while others see them as an attack on liberty and free speech and are coming to WikiLeaks' defense.
 
US Lags Behind Safeguarding Against Cyberattacks  07 December 2010 
Source: Red Orbit - Posted by Alex   
Experts say that it will take several more years for the government to fully install high-tech systems to block cyber-attacks, which is a drawn-out timeline that enables criminals to become better at stealing sensitive data.
 
Burning Questions About Google's Chrome OS  07 December 2010 
Source: TechTree - Posted by Alex   
If you've been keeping up with the happenings in the field of consumer technology, I'm sure you must have come across the talk of Chrome OS. Tagged as yet another daring, innovative concept from the Google labs, it has a fair chance of changing the way we think about Operating Systems in general. So what do we know about the Chrome OS till now and what should we expect at the unveiling today?
 
Security expert, Schneier says 'Cyberwar hotlines' are needed  06 December 2010 
Source: Tech World - Posted by Alex   
Security expert Bruce Schneier has called for governments to establish 'hotlines' between their cyber commands, much like the those between nuclear commands, to help them battle against cyber attacks.
 
Wikileaks' DNS pulls plug, citing collateral DDoS damage  03 December 2010 
Source: The Register UK - Posted by Alex   
Domain name provider EveryDNS has pulled the plug on Wikileaks after giving the site 24 hours' notice that it could not put up with the denial of service attacks the site was attracting.
 
WikiLeaks incidents stoke IT security angst  03 December 2010 
Source: Network World - Posted by Alex   
WikiLeaks' continued posting of classified U.S. Department of State cables, and the whistleblower Web site's revelation that it will soon post sensitive internal documents from a major U.S. bank , has stoked data security concerns among governments and large businesses around the world.
 
Companies beware: The next big leak could be yours  02 December 2010 
Source: Associated Press - Posted by Alex   
WikiLeaks' release of secret government communications should serve as a warning to the nation's biggest companies: You're next. Computer experts have warned for years about the threat posed by disgruntled insiders and by poorly crafted security policies, which give too much access to confidential data.
 
Amazon Ousts WikiLeaks  02 December 2010 
Source: Information Week - Posted by Alex   
Amazon.com has stopped hosting the WikiLeaks website, a day after the site was forced to move from its service provider in Sweden to escape a cyber-attack.
 
<< Start < Prev 58 59 60 Next > End >>

Results 571 - 580 of 832
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
University of California, Berkeley Hacked, Data Compromised
London teen pleads guilty to Spamhaus DDoS
New England security group shares threat intelligence, strives to bolster region
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.