LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: October 24th, 2014
Linux Security Week: October 20th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Latest News
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Google expands bug bounty program, ups Patch program rewards  05 February 2014 
Source: Network World - Posted by Anthony Pell   
Google is broadening its bug bounty program for security researchers to encompass all Chrome apps and extensions made by company. It's also upping payments for its Patch Rewards Program, focused on improvements for open-source code.
 
Coder Behind Notorious Bank-Hacking Tool Pleads Guilty  29 January 2014 
Source: Wired - Posted by Dave Wreski   
A Russian hacker who developed the widely used SpyEye banking trojan pleaded guilty today to creating the malicious toolkit, one of the most popular hacking tools of the past two years.
 
The U.S. Crackdown on Hackers Is Our New War on Drugs  24 January 2014 
Source: Wired - Posted by Alex   
Before Edward Snowden showed up, 2013 was shaping up as the year of reckoning for the much criticized federal anti-hacking statute, the Computer Fraud and Abuse Act (“CFAA”). The suicide of Aaron Swartz in January 2013 brought the CFAA into mainstream consciousness, so Congress held hearings about the case, and legislative fixes were introduced to change the law.
 
Google dismisses eavesdropping threat in Chrome feature  23 January 2014 
Source: TechWorld - Posted by Anthony Pell   
Chrome can continue to access a computer's microphone after a person thinks a speech recognition feature is off, a web developer says. Google said there's no threat from a speech recognition feature in its Chrome browser that a developer said could be used to listen in on users.
 
Federal Court Guts Net Neutrality Rules  15 January 2014 
Source: Wired - Posted by Dave Wreski   
A federal appeals court today nullified key provisions of the FCC’s net neutrality rules, opening the door to a curated approach to internet delivery that allows broadband providers to block content or applications as they see fit.
 
The 7 best habits of effective security pros  13 January 2014 
Source: CSO Online - Posted by Dave Wreski   
It's easy for security professionals who are passionate about their careers to get caught up in the technology, but success today requires a lot more than technical savvy. Here are the traits successful security pros say are needed to succeed
 
Dude, You Can’t Copyright That Hookah  10 January 2014 
Source: Wired - Posted by Dave Wreski   
A California hookah pipe maker’s copyright infringement lawsuit against a rival went up in smoke today when a federal appeals court ruled that hookahs are not copyrightable.
 
Alleged "Messiah" hacker rejects prosecution's drug charge offer  07 January 2014 
Source: Channel News Asia - Posted by Dave Wreski   
The man who allegedly goes by the moniker "The Messiah" and accused of compromising a town council's website rejected the prosecution's offer during a pre-trial conference on Tuesday.
 
Drug overdose caused death of hacker  07 January 2014 
Source: CNET - Posted by Dave Wreski   
Overdosing on drugs caused the death of hacker Barnaby Jack, said the San Francisco Medical Examiner's Office on Friday.
 
Court Upholds Willy-Nilly Gadget Searches Along U.S. Border  06 January 2014 
Source: Wired - Posted by Anthony Pell   
A federal judge today upheld a President Barack Obama administration policy allowing authorities along the U.S. border to seize and search laptops, smartphones and other electronic devices for any reason.
 
<< Start < Prev 7 8 9 Next > End >>

Results 61 - 70 of 808
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Pro-Privacy Senator Wyden on Fighting the NSA From Inside the System
NIST to hypervisor admins: secure your systems
Quick PHP patch beats slow research reveal
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.