LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: December 12th, 2014
Linux Security Week: December 9th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Intrusion Detection
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Wisconsin man sentenced for participating in Anonymous DDoS  03 December 2013 
Source: Network World - Posted by Anthony Pell   
A man from Wisconsin was sentenced for participating in a DDoS (distributed denial-of-service) attack by hacker group Anonymous on a Kansas company.
 
Worm targeting Apache Tomcat servers, possibly for DDoS  21 November 2013 
Source: Network World - Posted by Anthony Pell   
A worm-like type of malicious software has been found targeting Apache Tomcat, an open-source Web server application, according to Symantec.
 
Battle brews as tech companies attempt to fend off NSA hacking  19 November 2013 
Source: CNET - Posted by Anthony Pell   
The NSA allegedly gathered millions of records from Google and Yahoo data centers around the world, but soon, the agency might have a much harder time trying to collect this type of data.
 
The quest for weak links in information security  13 November 2013 
Source: CSO Online - Posted by Anthony Pell   
A widely accepted definition of information security risk is the potential of a specific threat exploiting the vulnerabilities of an information asset, with the following formula used to represent information security risks: Risk = Likelihood x Impact.
 
Denial-of-service tool targeting Healthcare.gov site discovered  07 November 2013 
Source: arsTechnica - Posted by Dave Wreski   
Researchers have uncovered software available on the Internet designed to overload the struggling Healthcare.gov website with more traffic than it can handle.
 
Risk-Based Authentication  07 November 2013 
Source: Schneier on Security - Posted by Dave Wreski   
I like this idea of giving each individual login attempt a risk score, based on the characteristics of the attempt: The risk score estimates the risk associated with a log-in attempt based on a user's typical log-in and usage profile, taking into account their device and geographic location, the system they're trying to access, the time of day they typically log in, their device's IP address, and even their typing speed.
 
Understanding the Threats in Cyberspace  28 October 2013 
Source: Schneier on Security - Posted by Dave Wreski   
The primary difficulty of cyber security isn't technology -- it's policy. The Internet mirrors real-world society, which makes security policy online as complicated as it is in the real world. Protecting critical infrastructure against cyber-attack is just one of cyberspace's many security challenges, so it's important to understand them all before any one of them can be solved.
 
Scared yet, web devs? Google smears malware warnings over PHP.net  24 October 2013 
Source: The Register UK - Posted by Dave Wreski   
Google's Safe Browsing technology is blocking access to PHP.net as a precaution, after apparently detecting that some of its pages were booby-trapped with links to malicious software.
 
Convicted hackers could help fight cyber crime in the UK  22 October 2013 
Source: Telegraph UK - Posted by Alex   
Convicted computer hackers could be recruited to help fight cyber crime in the UK, Philip Hammond has claimed. The Defence Secretary said he would consider allowing former criminals to join the new Joint Cyber Reserve Unit, saying every case would be “looked at on its merits”.
 
What the Internet of Things means for security  15 October 2013 
Source: Network World - Posted by Alex   
You've probably been hearing a lot lately about the Internet of Things (IoT). The IoT (see: "The IoT: A Primer" at the end of this piece), while still in the early stages of development, is slowly making its way into the mainstream as more objects become connected via technology such as radio frequency identification (RFID) and the iniquitousness of the Internet.
 
<< Start < Prev 7 8 9 Next > End >>

Results 61 - 70 of 834
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
The Difference Between Wi-Fi Security Protocols: WPA2-AES vs WPA2-TKIP
Segmenting for security: Five steps to protect your network
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.