Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: September 26th, 2014
Linux Security Week: September 22nd, 2014
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Latest News
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Federal Court Guts Net Neutrality Rules  15 January 2014 
Source: Wired - Posted by Dave Wreski   
A federal appeals court today nullified key provisions of the FCC’s net neutrality rules, opening the door to a curated approach to internet delivery that allows broadband providers to block content or applications as they see fit.
The 7 best habits of effective security pros  13 January 2014 
Source: CSO Online - Posted by Dave Wreski   
It's easy for security professionals who are passionate about their careers to get caught up in the technology, but success today requires a lot more than technical savvy. Here are the traits successful security pros say are needed to succeed
Dude, You Can’t Copyright That Hookah  10 January 2014 
Source: Wired - Posted by Dave Wreski   
A California hookah pipe maker’s copyright infringement lawsuit against a rival went up in smoke today when a federal appeals court ruled that hookahs are not copyrightable.
Alleged "Messiah" hacker rejects prosecution's drug charge offer  07 January 2014 
Source: Channel News Asia - Posted by Dave Wreski   
The man who allegedly goes by the moniker "The Messiah" and accused of compromising a town council's website rejected the prosecution's offer during a pre-trial conference on Tuesday.
Drug overdose caused death of hacker  07 January 2014 
Source: CNET - Posted by Dave Wreski   
Overdosing on drugs caused the death of hacker Barnaby Jack, said the San Francisco Medical Examiner's Office on Friday.
Court Upholds Willy-Nilly Gadget Searches Along U.S. Border  06 January 2014 
Source: Wired - Posted by Anthony Pell   
A federal judge today upheld a President Barack Obama administration policy allowing authorities along the U.S. border to seize and search laptops, smartphones and other electronic devices for any reason.
Security industry tainted in latest RSA revelations  26 December 2013 
Source: CSO Online - Posted by Dave Wreski   
Trust in the security industry has taken a blow with a recent report that RSA was paid by the U.S. National Security Agency to provide a way to crack its encryption.
Torvalds: Linux devs may 'cry into our lonely beers' at Christmas  24 December 2013 
Source: The Register UK - Posted by Dave Wreski   
Linus Torvalds has let release candidate five for version 3.13 of the Linux kernel into the wild for some festive footling.
CryptoLocker Creators Infected Nearly 250,000 Systems, Earned $300k Since September  20 December 2013 
Source: ThreatPost - Posted by Dave Wreski   
New American presidents often are measured by what they accomplish in their first 100 days. By that yardstick, the crew behind the CryptoLocker ransomware have been a raging success.
Finally, a Ruling That Recognizes Snowden as a Whistleblower  19 December 2013 
Source: Wired - Posted by Alex   
Daniel Ellsberg had it right from the start. Just a few days after the first Edward Snowden bombshell dropped in June — showing that the NSA was hoovering all phone metadata in the U.S. — the famed Pentagon Papers leaker declared that the revelation was the most important leak in American history.
<< Start < Prev 7 8 9 Next > End >>

Results 61 - 70 of 804


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.