LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: September 15th, 2014
Linux Security Week: September 8th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Latest News
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Vulnerability in FreeBSD's memory management  13 July 2010 
Source: H Security - Posted by Alex   
A vulnerability in the memory management of FreeBSD's network subsystem allows authenticated users to edit files for which they only have read privileges. The sendfile command uses mbuf memory to buffer the content of the file to be transmitted.
 
Choosing Whether To Go Open Source  12 July 2010 
Source: Forbes - Posted by Anthony Pell   
Open source has always been a favorite among scientists and universities where budgets are limited but where there is plenty of expertise around to fiddle with the code and customize it for a specific project or department. It never behaved like the costlier, commercially available products from big-name vendors, and it required lots of patience for dealing with quirks and knowledge of some arcane coding tricks.
 
Code Cracked! Cyber Command Logo Mystery Solved  12 July 2010 
Source: Wired - Posted by Dave Wreski   
Okay, maybe it wasn’t that much of a mystery. In fact, it took a little more than three hours for Danger Room reader jemelehill to figure out the odd string of letters and numbers in the logo of the U.S. military’s new Cyber Command. Turns out, it’s the new unit’s mission statement, translated into 32 digits with the md5 cryptographic hash:
 
Security On A Shoestring SMB Budget  08 July 2010 
Source: Dark Reading - Posted by Alex   
As small and midsize businesses increasingly become big targets for cybercrime, locking down their networks cheaply can be a challenge.
 
Communication breakdown: Security's language problem  07 July 2010 
Source: CSO Online - Posted by Anthony Pell   
It's an old problem in the security industry -- vendors, public-relations firms and the media coin all these catch phrases and buzz words to describe the latest threat or technological solution. Then the smarter industry voices get all uptight about it.
 
15 must-listen podcasts for security pros  02 July 2010 
Source: IT World - Posted by Anthony Pell   
It may be cliché but security is an ever-changing world. I am often asked how I keep up to date on the latest security trends and news in this rapidly changing world. The two primary tools I use to do this are security podcasts and Twitter. Being a consultant I spend a lot of time on the road and have long periods of free time while driving or flying to clients' sites.
 
Google steals security page from Mozilla's Firefox  30 June 2010 
Source: Network World - Posted by Anthony Pell   
Google will take a page from Mozilla's playbook and block outdated plug-ins from launching, part of new efforts to keep Chrome users safer, the company said Monday. In a post to the Chromium blog , a trio of Google security engineers announced that Chrome would refuse to run plug-ins if they were found to be out of date, and thus, potentially vulnerable to exploitation of known bugs.
 
Reliance on passwords is biggest security threat, says hacking expert  29 June 2010 
Source: Computer Weekly - Posted by Alex   
Passwords are fundamentally insecure and represent the biggest security threat facing organisations, says Jason Hart, senior vice-president for Europe at security firm Cryptocard.
 
Ex-Hacker Who Accused Leak Suspect Is Still Talking  28 June 2010 
Source: NY Times - Posted by Anthony Pell   
For weeks now, the United States military has been holding an Army intelligence analyst, Bradley Manning, in connection with the release of classified materials to the whistle-blower Web site Wikileaks. He is suspected of being the source of the 2007 video of an Apache helicopter killing 12 civilians in Iraq, including two Reuters journalists. More ominously, he is feared to have leaked 260,000 secret diplomatic cables.
 
The strange case of the artist and the hacker  25 June 2010 
Source: The Globe and Mail - Posted by Anthony Pell   
Byron Sonne and Kristen Peterson are life partners leading very different lives. Mr. Sonne is a computer expert whose job is to delve deep into the realm of complex electronic security networks; in his spare time, he frequents “hackerspaces” and derides the way people are monitored in their everyday lives.
 
<< Start < Prev 64 65 66 Next > End >>

Results 651 - 660 of 802
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Encryption goof fixed in TorrentLocker file-locking malware
Qubes: The Open Source OS Built for Security
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.