LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: October 24th, 2014
Linux Security Week: October 20th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Latest News
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Kinect Hacked To Work On PCs  12 November 2010 
Source: PC World - Posted by Alex   
Well, that was fast. Do-it-yourself electronics kit maker and hobby retailer Adafruit recently announced that a hacker had won the company's Open Kinect Bounty. Spain-based hacker Hector Martin Cantero, who is known online as "marcan," released a proof-of-concept video Wednesday night showing the Kinect interfacing with his Linux-based laptop.
 
Botnet takedowns curb spam volumes  11 November 2010 
Source: The Register UK - Posted by Anthony Pell   
Spam volumes almost halved in the three months between August and the end of October, according to Symantec. Symantecís hosted services unit (formerly MessageLabs) credits a 47 per cent sharp decrease in global spam volumes to action by the authorities against botnets and organised cybercrooks.
 
Get hacked and spill the beans, anonymously  11 November 2010 
Source: CNET - Posted by Anthony Pell   
A new Web site could help turn security breach guesswork into science. Database breaches, social engineering attacks, and hacking incidents happen at companies every day, but very few end up being reported publicly. That's because organizations fear--and rightly so--damage to their reputation, public humiliation, and loss of customer confidence.
 
Think You Have What it Takes to be a Hacker?  10 November 2010 
Source: Brickhouse Security - Posted by Alex   
If you have some decent hacking skills then perhaps, Google is looking for you. No, not to interrogate you for past crimes, but rather to interview you for a a potential career.
 
Application Security; Donít get caught off guard with dangerous assumptions  09 November 2010 
Source: Acunetix - Posted by Anthony Pell   
Donít get caught off guard. We hear that statement all the time with regards to information security. Sadly, as many businesses have experienced, such talk is cheap. Obviously no one wants their Web site to get hacked.
 
Since When Are Hacker Tools Covered By Freedom Of Speech?  09 November 2010 
Source: eWeek Europe - Posted by Alex   
Firesheep raised the profile of some attacks on websites, says Peter Judge. But Microsoft has a perfect right to help IT staff to block it. Thereís been an interesting follow-up to the Firesheep incident, in which an attack tool was released which allows ďsidejackingĒ of Firefox sessions.
 
Hacker Reportedly Delivers an Open-Source Kinect Driver  08 November 2010 
Source: Huliq - Posted by Anthony Pell   
Only a few days after the Kinect motion-sensing gaming add-on for the Xbox 360 went on sale, it may have been hacked. At the urging (with a $2,000 bounty) of Adafruit Industries, a hacker appears to have delivered an open-source driver for Kinect, already.
 
WellPoint Sued For Delay In Disclosing Security Breach  04 November 2010 
Source: Dark Reading - Posted by Alex   
The Indiana Attorney General's office today filed a lawsuit against WellPoint Inc. claiming the health insurance provider did not notify its customers or the Attorney General's office in a timely manner following a data breach earlier this year affecting more than 32,000 customers.
 
Researchers To Demonstrate New Attack That Exploits HTTP  02 November 2010 
Source: Dark Reading - Posted by Anthony Pell   
A flaw in the HTTP protocol leaves the door open for attackers to wage a new form of distributed denial-of-service (DDoS) attack that floods Web servers with very slow HTTP "POST" traffic. Researchers next week at the OWASP 2010 Application Security Conference will demonstrate the new attack, showing how online gaming could be used as a way to recruit bots in an "agentless" botnet
 
Google Enhances Android Mobile Device Security  29 October 2010 
Source: Enterprise Mobile Today - Posted by Anthony Pell   
Google today made it easier for mobile IT administrators to securely manage Android 2.2 (Froyo) devices from within Google Apps.
 
<< Start < Prev 58 59 60 Next > End >>

Results 571 - 580 of 808
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.