LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: October 24th, 2014
Linux Security Week: October 20th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Latest News
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



The state of computer (in)security  16 June 2010 
Source: Lubbock Online - Posted by Anthony Pell   
Andy Kaiser of "Digital Bits Skeptic" had an interesting blog post earlier this month regarding the state of computer security. Entitled, "The myth of computer security," it takes a look at the real state of computer security, not what the anti-virus and anti-malware vendors would like you to think.
 
Code Security: SAFECode report highlights best practices  15 June 2010 
Source: CSO Online - Posted by Alex   
A new report from the Software Assurance Forum for Excellence in Code (SAFECode) sheds new light on how vendors are trying to work more secure coding into the product development process.
 
Googler criticized for disclosing Windows-related flaw  11 June 2010 
Source: CNET - Posted by Anthony Pell   
Microsoft and outside security researchers accused a Google engineer of failing to follow the responsible disclosure etiquette his own company promotes by disclosing a Windows XP-related flaw on Thursday, publishing code to exploit it and giving Microsoft only five days to fix it.
 
Surprising findings in developers' open source usage  11 June 2010 
Source: InfoWorld - Posted by Alex   
Results from the 2010 Eclipse User Survey reveal interesting trends surrounding open source usage and opinions. Although it would be a stretch to say that these results from the 457 respondents represent the overall market, they do provide an interesting picture of development decisions being made by companies that are oriented to open source adoption.
 
New security fixes for Chrome stable  10 June 2010 
Source: CNET - Posted by Alex   
Google pushed out an update for the stable branch of its Chrome browser Wednesday. The update, for Windows, Mac, and Linux, addresses multiple security bugs including nine tagged as high-level problems.
 
Hacker justifies turning in Wikileaks informer  09 June 2010 
Source: Network World - Posted by Alex   
Former hacker Adrian Lamo has claimed to be the source who informed on a US soldier accused of sending the Wikileaks whistleblowing site video footage of a helicopter shooting unarmed Iraqi civilians.
 
Security vendors must eradicate 'false positives'  08 June 2010 
Source: Network World - Posted by Anthony Pell   
Symantec believes security firms should be concentrating on eradicating 'false positives' or files that are incorrectly identified as malware. The security vendor revealed it has between 10 and 40 false positives a month. However, most of these do not affect a wide number of PC users.
 
Is it possible to measure IT Security?  28 May 2010 
Source: The Register UK - Posted by Anthony Pell   
It is a commonly held principle in many areas of business that if you can’t measure something “quantitatively”, it will be difficult to raise the quality objectively. The applicability of this statement to the world of IT security is clear. Without having some form of metrics in place, it is tough, if not impossible, to judge whether security is getting better over time.
 
Newly open source BitTorrent protocol aims to unclog tubes  27 May 2010 
Source: arsTechnica - Posted by Anthony Pell   
The company behind the BitTorrent technology has opened the source code of its uTorrent Transport Protocol (uTP). A production-ready implementation of the protocol code in C++ is now available from GitHub under the MIT license.
 
When the Administrator walks...  27 May 2010 
Source: Linux Journal - Posted by Anthony Pell   
We never like to see our co-workers leave. In most cases, though, we are are happy for them because they are going on to bigger and better things. But occasionally they are not leaving under their own power. And that is when things can get...well...messy. So before you are tasked with the job of putting it all back together, why not take a moment and prepare.
 
<< Start < Prev 67 68 69 Next > End >>

Results 671 - 680 of 808
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Pro-Privacy Senator Wyden on Fighting the NSA From Inside the System
NIST to hypervisor admins: secure your systems
Quick PHP patch beats slow research reveal
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.