Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 23rd, 2015
Linux Advisory Watch: March 20th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

How Kevin Mitnick hacked the audience at CeBIT 2015  26 March 2015 
Source: PC Pro UK - Posted by Dave Wreski   
CeBIT attendees on Thursday fell victims to a series of well-executed hacks. Thankfully, they weren’t malicious in origin; instead, they were live demonstrations by notorious ex-hacker Kevin Mitnick.
New England security group shares threat intelligence, strives to bolster region  17 December 2014 
Source: Network World - Posted by Alex   
The Advanced Cyber Security Center is a three year old organization with a bold mission to “bring together industry, university, and government organizations to address the most advanced cyber threats” and drive cybersecurity R&D in the New England region.
Hacker Halted 2014: Johnny Long Calls for Hackers for Charity Volunteers  21 October 2014 
Source: InfoSecurity Magazine - Posted by Dave Wreski   
The irony was not lost on Johnny Long. On the silver screen, both hackers and zombies are typically associated with disaster, so the fact that he was at a zombie-themed security conference to speak about hackers making a positive difference in the world seemed satirical.
Sir Tim Berners-Lee defends decision not to bake security into www  08 October 2014 
Source: The Register UK - Posted by Alex   
Sir Tim Berners-Lee has defended his decision not to build in security at the onset of the world wide web. It’s easy to be wise in hindsight, but Sir Tim explained that at the point he invented the world wide web 25 years ago, he wanted to create a platform that developers would find familiar and easy to use. Baking in security at that point might have worked against that goal, he said.
Hacking cars and traffic lights at Def Con  20 August 2014 
Source: BBC - Posted by Alex   
One of the biggest hacking conferences in the world, Def Con, took place earlier this month. Cybersecurity talks included hacking cars, traffic lights and social engineering - where actors tried to get real companies to reveal compromising information.
Founder of America’s Biggest Hacker Conference: ‘We Understand the Threat Now’  13 August 2014 
Source: Time - Posted by Dave Wreski   
The hacker who has presided for 22 years over what is today the biggest hacker conference in the United States talks to TIME about Edward Snowden, Dorian Gray and hackers' changing role in society.
The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences  12 August 2014 
Source: Network World - Posted by Anthony Pell   
It's that time of year again: The wonderful, terrifying week when hackers and security gurus descend upon Las Vegas to show off their skills and unleash presentation after presentation full of scary-sounding exploits. This year is no different. Over the previous week, we've heard tales of planes brought down by rogue code, snoops spying on your security cameras, and secretive, undetectable code that can turn any USB drive into an unstoppable malware vessel.
10 ways to get noticed at Black Hat  11 August 2014 
Source: CSO Online - Posted by Dave Wreski   
Some of the more eccentric members of the security industry show up for Black Hat each year, making it tough to stand out in the enormous crowd that flocks to Las Vegas for the A-list conference. But each year vendors manage to come up with gimmicks and gizmos that attract the throngs to their booths to hear a spiel or give up their contact information so they can receive sales calls when they get home. Here are some noteworthy examples from Black Hat 2014.
Car Hacking Enters Remote Exploitation Phase  07 August 2014 
Source: ThreatPost - Posted by Dave Wreski   
Charlie Miller and Chris Valasek have proven to be adept backseat drivers. Noted for their car-hacking exploits, Miller and Valasek have gained fame at hacking conferences and on Fox News for forcing automobiles to do their bidding.
Black Hat USA 2014: Talking botnets and ad campaigns  07 August 2014 
Source: CSO Online - Posted by Dave Wreski   
"The situation we're in with advertising is a lot like where the banks are, where everyone has struggled with the fact that you can't trust the other end of the connection," says White Ops CEO Michael Tiffany. "It's the same cookies, user information, etc. But one is real, and the other is fake."
<< Start < Prev 1 2 3 Next > End >>

Results 1 - 10 of 387


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
OpenSSL Mystery Patch is No Heartbleed
Study: One-third of top websites vulnerable or hacked
Threat-sharing cybersecurity bill unveiled
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.