LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: July 25th, 2014
Linux Advisory Watch: July 18th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Latest News
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Security measures seen doing more harm than good  18 September 2006 
Source: Network World - Posted by Vincenzo Ciaglia   
Many of the security measures put in place after the Sept. 11, 2001, attacks on the World Trade Center in New York are doing more harm than good, said two speakers scheduled to present at the Hack In The Box Security Conference (HITB) this week. The effect of many security measures put in place by governments after Sept. 11 has been to strengthen control over their citizens and erode democratic freedoms, said Roberto Preatoni, a security consultant who works in Italy. "The Internet allows you to do more effective things regarding controlling the population," he said.

 
What you should (and shouldn't) expect from 64-bit Linux  13 September 2006 
Source: Linux.com - Posted by Vincenzo Ciaglia   
So you just bought and assembled a brand-new AMD64 workstation. The only decision that remains is whether to install a 64-bit Linux distribution, or stick with comfortable, tried-and-true IA-32. If you are seeking an easy answer to that question, I can't help you. Running 64-bit Linux has its pros and cons. Unfortunately, a lot of the cons are out of your hands -- but they're not really Linux's fault, either.

 
Swiss developers start rolling Your Own Linux Distribution  25 August 2006 
Source: Linux.com - Posted by Efren J. Belizario   
Ark Linux project developers operate on a "no-frills" policy when it comes to deciding what features will be included in their distribution. They strive to provide only the tools necessary for a typical desktop user, creating a lean, mean Linux. When some users came asking for more features, rather than violate their policy of simplicity, the developers launched a completely new company called YOLD (Your Own Linux Distribution).

 
IBM to pay $1.3B for security provider  23 August 2006 
Source: FCW.com - Posted by Efren J. Belizario   
IBM announced today that it has entered into a definitive agreement to purchase Internet Security Systems (ISS), a publicly traded Internet security provider based in Atlanta.

 
Virtual ID card could pose problems  23 August 2006 
Source: Security Park - Posted by Vincenzo Ciaglia   
A virtual ID card designed to improve children's net safety has been launched in the UK, US, Canada and Australia. The NetIDMe card can be swapped by children online when using chatrooms, instant messaging and social networks. Parents and children can apply for the card using credit card details and a form countersigned by a professional who knows the child concerned.

 
Vincenzo Ciaglia - Guardian Digital, Inc.  21 August 2006 
Posted by Efren J. Belizario   
Guardian Digital, Inc. takes great pleasure in welcoming Vincenzo Ciaglia of Eboli, Italy to its team. Vincenzo is the creator of Netwosix Linux, a highly-secure Linux distribution, and a long-time student of open source networking and security technologies. Netwosix has been downloaded by more than 60,000 users around the world.

 
LinuxSecurity.com Launches New Web Site  21 August 2006 
Allendale, New Jersey, August 21, 2006-LinuxSecurity.com, the definitive source for Linux and open source security news, today launched its new website. Founded by Guardian Digital CEO Dave Wreski in 1996, LinuxSecurity.com has become the pre-eminent information resource for IT professionals and open source community members alike. The site, which is supported and maintained by Guardian Digital staff members, employs a global network of expert and volunteer contributors to develop feature articles, commentaries and reviews as well as compile extensive collections of the latest security updates to help readers keep up with the latest advancements in Linux and open source security.

 
Passmark Sitekey at Bank of America Vulnerability  17 August 2006 
Source: Help Net Security - Posted by LogError   
LogError writes: A vulnerability of the Passmark Sitekey login approach at Bank of America could permit an attacker to remotely lock out thousands of customers from their online banking accounts. The vulnerability announced today is similar to a DoS attack in that it permits an attacker to remotely "lock out" customers from their online accounts, potentially overwhelming the bank's customer support lines with calls from frustrated customers.

 
Biometric polygraph next for airport security?  15 August 2006 
Source: SecurityFocus.com - Posted by Eric Lubow   
Got something to hide? You may not want to reconsidering flying in the future. An Israeli company has come up with a biometric system for detecting emotional responses to a series of questions. The system, dubbed Cognito, uses polygraph-like techniques to detect when a passenger is worried during a series of questions. Within 5 minutes, the system makes a determination of whether the passenger should be further questioned by authorities, according to the company. "What we are looking for are patterns of behavior that indicate something all terrorists have: the fear of being caught," Shabtai Shoval, chief executive of biometric systems maker Suspect Detection Systems, told the Wall Street Journal in a Monday article.

 
New Identity Theft and Online Fraud Techniques  08 August 2006 
Source: Net-Security.org - LogError - Posted by Benjamin D. Thomas   
Authors of computer viruses and threats -including phishing scams- are looking for direct financial profit from cybercrime. For this reason, they are using more innovative and diversified techniques to, above all, steal usersí identities or obtain bank details to commit fraud.

 
<< Start < Prev 73 74 75 Next > End >>

Results 741 - 750 of 786
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
How Hackers Hid a Money-Mining Botnet in Amazonís Cloud
Homeland Security gets into software security
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.