Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: July 28th, 2014
Linux Advisory Watch: July 25th, 2014
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

RSA: That NSA crypto-algorithm we put in our products? Stop using that  27 September 2013 
Source: The Register UK - Posted by Dave Wreski   
Security biz RSA has reportedly warned its customers to stop using the default random-number generator in its encryption products - amid fears spooks can easily crack data secured by the algorithm.
The devil and the details  20 September 2013 
Source: Economist - Posted by Dave Wreski   
Quantum cryptography has yet to deliver a truly unbreakable way of sending messages. Quantum entanglement may change that. RECENT revelations of online snooping on an epic scale, by government agencies which may well have been breaking the law, have prompted some users of the internet to ask who you can trust with sensitive data these days.
Cryptographers Attack NSA's Secret Effort to Subvert Internet Security  17 September 2013 
Source: Slate - Posted by Alex   
Cryptographers are fighting back against efforts by spy agencies to secretly weaken the encryption standards designed to keep the Internet secure.
Conspiracy Theories and the NSA  06 September 2013 
Source: Schneier on Security - Posted by Anthony Pell   
I've recently seen two articles speculating on the NSA's capability, and practice, of spying on members of Congress and other elected officials. The evidence is all circumstantial and smacks of conspiracy thinking -- and I have no idea whether any of it is true or not -- but it's a good illustration of what happens when trust in a public institution fails.
'Cryptopalypse' Now: Looming Security Crisis  19 August 2013 
Source: tom's guide - Posted by Dave Wreski   
The Internet, and many forms of online commerce and communication that depend on it, may be on the brink of a "cryptopalypse" resulting from the collapse of decades-old methods of shared encryption.
Zimmermann’s Law: PGP inventor and Silent Circle co-founder Phil Zimmermann  12 August 2013 
Source: GigaOM - Posted by Dave Wreski   
Phil Zimmermann, creator of PGP, in a wide-ranging interview talks about the corrupting nature of big data, the end of privacy and the rise of the surveillance society. He also shared his thoughts on Moore’s Law and its marriage to public policy, and why Silent Circle shutdown its email-service.
Matthew Green on Crypto Advances, the BREACH Attack and the Longevity of the RSA Algorithm  09 August 2013 
Source: ThreatPost - Posted by Dave Wreski   
Dennis Fisher talks with Matthew Green of Johns Hopkins University about the crypto advances in recent years, the BREACH attack revealed at Black Hat and whether it’s time to start moving away from the RSA algorithm.
Twitter's Two-Factor Authentication System  08 August 2013 
Source: Schneier on Security - Posted by Dave Wreski   
Twitter just rolled out a pretty nice two-factor authentication system using your smart phone as the second factor: The new two-factor system works like this. A user enrolls using the mobile app, which generates a 2048-bit RSA keypair. The private key lives on the phone itself, and the public key is uploaded to Twitter’s server.
Inside the Tor exploit  05 August 2013 
Source: ZDNet Blogs - Posted by Alex   
Some of the people who were most concerned about Internet privacy, and we're using the Tor anonymous Internet service to protect it, may have been the most exposed.
A Couple of SSH Brute Force Compromises  26 July 2013 
Source: SANS/ISC - Posted by Dave Wreski   
One common and stupidly simple way hosts are compromissed is weak SSH passwords. You would think people have learned by now, but evidently there are still enough systems with root passwords like 12345 around to make scanning for them a worthwhile exercise.
<< Start < Prev 7 8 9 Next > End >>

Results 61 - 70 of 1108


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
NSA keeps low profile at hacker conventions despite past appearances
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.