LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: October 20th, 2014
Linux Advisory Watch: October 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Organizations/Events
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



CERT: Multiple Vulnerabilities in Several Implementations of the Lightweight Directory Access Protoc  17 July 2001 
Source: CERT - Posted by Dave Wreski   
Several implementations of the Lightweight Directory Access Protocol (LDAP) protocol contain vulnerabilities that may allow denial-of-service attacks, unauthorized privileged access, or both. If your site uses any of the products listed in this advisory, the CERT/CC encourages you to follow the . . .
 
Def Con wears a white hat now  16 July 2001 
Source: ZDNet - Posted by Dave Wreski   
Is hacking starting to lose its culture? Though black clothing still dominated and clusters of hackers exchanging information was still the norm, the crowd at this year's Def Con was older and appeared to be far more professional. "It is more laid back this year," acknowledged Jeff Moss, the founder of the conference, now in its ninth year.. . .
 
At Black Hat, ties seen tightening between hackers, legal officials  16 July 2001 
Source: Computer World - Posted by Pete O'Hara   
Hackers, computer security managers and law enforcement officials teamed up at this week's Black Hat Briefings conference to discuss their respective roles in securing the Internet and to urge attendees who engage in hacking activities to stay on the right side . . .
 
Hackers in Suits? Gadzooks!  15 July 2001 
Source: Wired - Posted by Dave Wreski   
For nine years, Defcon has been known as the world's most exuberant party for hackers and hacker hopefuls who gather in sin city for a rollicking good time. Conference organizers call it the "annual computer underground party for hackers," and Defcon . . .
 
Security showdown: Black Hat vs. Def Con  11 July 2001 
Source: ZDNet - Posted by Derrick Lewis   
Las Vegas plays host to two separate security conferences this week--one for people who guard computer systems, another for those who break into them. System administrators and hackers, CIOs and script kiddies will all gather in the desert to trade information, . . .
 
Hackers Convene Amid Signs Computer Security Is Eroding  10 July 2001 
Source: Newsfactor - Posted by Pete O'Hara   
Hacker conventions, such as those being held in Las Vegas this week, are no longer considered the sinister gatherings they once were. If the slot machines get a little screwy this week, casino detectives will have plenty of suspects. Thousands of computer hackers and security experts begin converging in Las Vegas Tuesday for the annual Black Hat Briefings and Def Con convention on computer security.. . .
 
IT directors not gambling on security  09 July 2001 
Source: ZDNet - Posted by Benjamin D. Thomas   
Despite high profile security breaches the issue is still not a priority for many, a survey finds Half of IT directors are willing to bet less than £1 that their IT systems are safe from hacker attack, according to a . . .
 
User group proposes OS security standards  06 July 2001 
Source: vnunet - Posted by Nick DeClario   
The Center for Internet Security (CIS), a coalition of internet user groups, yesterday released the first set of minimum security standards for operating systems. Starting off with specs for Solaris, the user group plans to introduce similar standards for Windows, as . . .
 
The Black Hat Briefings 2001 USA  25 June 2001 
Source: Blackhat.com - Posted by Pete O'Hara   
The Black Hat Briefings is a conference for researchers, IT professionals and experienced security administrators. Every year, leaders in the security field are brought together to Black Hat to discuss the latest threats, trends, products, and influences in the Internet and . . .
 
ICANN To Gauge Privacy Concerns Over 'Whois' Database  13 June 2001 
Source: NewsBytes - Posted by Dave Wreski   
The organization charged with managing the worldwide Domain Name System (DNS) has launched a study to gauge privacy concerns raised by the plethora of personal information contained in the "Whois" database, a publicly searchable resource used to determine the identity of . . .
 
<< Start < Prev 34 35 36 Next > End >>

Results 331 - 340 of 385
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Pro-Privacy Senator Wyden on Fighting the NSA From Inside the System
NIST to hypervisor admins: secure your systems
Quick PHP patch beats slow research reveal
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.