LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: July 28th, 2014
Linux Advisory Watch: July 25th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Intrusion Detection
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Hackers meet professor's challenge to pen test his online world  05 December 2013 
Source: CSO Online - Posted by Alex   
Everybody knows, or ought to know, about the risks of being hacked. But it's easy to slip into a level of denial about an amorphous threat and get careless if you don't think anybody is out specifically to get you.
 
Wisconsin man sentenced for participating in Anonymous DDoS  03 December 2013 
Source: Network World - Posted by Anthony Pell   
A man from Wisconsin was sentenced for participating in a DDoS (distributed denial-of-service) attack by hacker group Anonymous on a Kansas company.
 
Worm targeting Apache Tomcat servers, possibly for DDoS  21 November 2013 
Source: Network World - Posted by Anthony Pell   
A worm-like type of malicious software has been found targeting Apache Tomcat, an open-source Web server application, according to Symantec.
 
Battle brews as tech companies attempt to fend off NSA hacking  19 November 2013 
Source: CNET - Posted by Anthony Pell   
The NSA allegedly gathered millions of records from Google and Yahoo data centers around the world, but soon, the agency might have a much harder time trying to collect this type of data.
 
The quest for weak links in information security  13 November 2013 
Source: CSO Online - Posted by Anthony Pell   
A widely accepted definition of information security risk is the potential of a specific threat exploiting the vulnerabilities of an information asset, with the following formula used to represent information security risks: Risk = Likelihood x Impact.
 
Denial-of-service tool targeting Healthcare.gov site discovered  07 November 2013 
Source: arsTechnica - Posted by Dave Wreski   
Researchers have uncovered software available on the Internet designed to overload the struggling Healthcare.gov website with more traffic than it can handle.
 
Risk-Based Authentication  07 November 2013 
Source: Schneier on Security - Posted by Dave Wreski   
I like this idea of giving each individual login attempt a risk score, based on the characteristics of the attempt: The risk score estimates the risk associated with a log-in attempt based on a user's typical log-in and usage profile, taking into account their device and geographic location, the system they're trying to access, the time of day they typically log in, their device's IP address, and even their typing speed.
 
Understanding the Threats in Cyberspace  28 October 2013 
Source: Schneier on Security - Posted by Dave Wreski   
The primary difficulty of cyber security isn't technology -- it's policy. The Internet mirrors real-world society, which makes security policy online as complicated as it is in the real world. Protecting critical infrastructure against cyber-attack is just one of cyberspace's many security challenges, so it's important to understand them all before any one of them can be solved.
 
Scared yet, web devs? Google smears malware warnings over PHP.net  24 October 2013 
Source: The Register UK - Posted by Dave Wreski   
Google's Safe Browsing technology is blocking access to PHP.net as a precaution, after apparently detecting that some of its pages were booby-trapped with links to malicious software.
 
Convicted hackers could help fight cyber crime in the UK  22 October 2013 
Source: Telegraph UK - Posted by Alex   
Convicted computer hackers could be recruited to help fight cyber crime in the UK, Philip Hammond has claimed. The Defence Secretary said he would consider allowing former criminals to join the new Joint Cyber Reserve Unit, saying every case would be “looked at on its merits”.
 
<< Start < Prev 4 5 6 Next > End >>

Results 41 - 50 of 815
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Hackers Plundered Israeli Defense Firms that Built ‘Iron Dome’ Missile Defense System
Internet of things big security worry, says HP
Boffins build FREE SUPERCOMPUTER from free cloud server trials
Insecure Connections: Enterprises hacked after neglecting third-party risks
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.