Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: April 7th, 2014
Linux Advisory Watch: April 4th, 2014
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Data encryption adds twist to ransomware  31 January 2013 
Source: CSO Online - Posted by Anthony Pell   
A new version of the well-known police ransomware takes the unusual step of encrypting files on the infected PC, so the malware cannot be easily removed.
Rogue Google SSL certificate not used for dishonest purposes, Turktrust says  07 January 2013 
Source: InfoWorld - Posted by Anthony Pell   
Turktrust, the Turkish CA (certificate authority) responsible for issuing an intermediate CA certificate that was later used to generate an unauthorized certificate for, claims that the bad Google certificate was not used for dishonest purposes.
Breaking Hard-Disk Encryption  31 December 2012 
Source: Schneier on Security - Posted by Dave Wreski   
The newly announced ElcomSoft Forensic Disk Decryptor can decrypt BitLocker, PGP, and TrueCrypt. And it's only $300. How does it work?
China Now Blocking Encryption  20 December 2012 
Source: Schneier on Security - Posted by Dave Wreski   
The "Great Firewall of China" is now able to detect and block encryption: A number of companies providing "virtual private network" (VPN) services to users in China say the new system is able to "learn, discover and block" the encrypted communications methods used by a number of different VPN systems.
Encryption, not restriction, is the key to safe cloud computing  12 November 2012 
Source: NexGov - Posted by Anthony Pell   
It’s 11 p.m. Do you know where your data is? If your enterprise has transitioned to the cloud for data storage the answer almost certainly is “no.” Portions of it might be in Malaysia; other bits in Antigua.
How a Google Headhunter’s E-Mail Unraveled a Massive Net Security Hole  24 October 2012 
Source: Wired - Posted by Pooja Shah   
So he wondered if the e-mail might have been spoofed – something sent from a scammer to appear to come from the search giant. But when Harris examined the e-mail’s header information, it all seemed legitimate.
Attacking TrueCrypt  24 October 2012 
Source: H Security - Posted by Anthony Pell   
The open source TrueCrypt disk encryption tool is considered the to be the software of choice for systematically encrypting data. It is able to encrypt individual drives, such as USB Flash drives, and even entire hard drives. A small utility called TCHead is, however, able to tackle data encrypted using TrueCrypt.
How I Accidentally Helped Compromise The Secret Keys Of High-Security Handcuffs  15 October 2012 
Source: Forbes - Posted by Dave Wreski   
In the age of freely available modeling software, laser cutters and 3D printers, shapes that must stay secret for security’s sake don’t stay secret for long. Especially, it turns out, when a reporter wielding an iPhone camera is around.
Story of a CIA Burglar  09 October 2012 
Source: Schneier On Security - Posted by Dave Wreski   
This is a fascinating story of a CIA burglar, who worked for the CIA until he tried to work against the CIA. The fact that he stole code books and keys from foreign embassies makes it extra interesting, and the complete disregard for the Constitution at the end makes it extra scary.
NIST crowns next-gen hash algorithm Keccak as official SHA-3  03 October 2012 
Source: The Register UK - Posted by Dave Wreski   
A US government agency has selected cryptographic hash function Keccak as the new official SHA-3 algorithm.
<< Start < Prev 7 8 9 Next > End >>

Results 61 - 70 of 1086


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.