LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: October 20th, 2014
Linux Advisory Watch: October 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Server Security
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Linux Webserver Rootkit Attacks Internet Users  03 December 2012 
Source: Toms Hardware - Posted by Anthony Pell   
Rootkit.Linux.Snakso.a is designed to infect the Linux kernel version 2.6.32-5-amd64 and adds an iframe to all served web pages by the infected Linux server via the nginx proxy.
 
Researchers Raving Over Remarkable Rootkit  20 November 2012 
Source: Tech Week EU - Posted by Dave Wreski   
One of the more advanced rootkits to have hit town in recent memory has got security researchers across the globe in a tizz, even though it hasn’t even been finished.
 
HTTPS Everywhere 3.0 supports more sites  09 October 2012 
Source: H Security - Posted by Dave Wreski   
The Electronic Frontier Foundation (EFF) has released a new version of its HTTPS Everywhere browser extension for Firefox that now supports encryption on even more web sites. The US digital rights advocacy organisation says that version 3.0 of its Firefox add-on, which automatically redirects users to more secure HTTPS connections when accessing certain web pages, now supports an additional 1,500 sites, more than twice as many as previous stable releases.
 
NSA: Building a More Secure Android  30 August 2012 
Source: eSecurity Planet - Posted by Anthony Pell   
It's no secret that Google's Android mobile operating system has had its share of security flaws. But what is less well-known is that the U.S. government's National Security Agency (NSA) is among the teams working to improve Android security.
 
Create A Mac Zombie Army, Cheap: Hacker Emptor  24 August 2012 
Source: Information Week - Posted by Dave Wreski   
Going once, going twice: The new NetWeird toolkit can be used to infect Apple OS X systems, converting Macs into zombies ready to do your botnet bidding, with prices starting at just $60.
 
The Hack That Kept Me Awake at Night  13 August 2012 
Source: The Atlantic - Posted by Anthony Pell   
If I've seemed a little bleary-eyed and inattentive this week you can blame Jim Fallows. Late on Tuesday night I read his post about gmail, which linked to Mat Honan's piece for Wired about the destruction of his (Honan's) digital life. I was then up most of the night implementing Jim's advice about improving my computer security. This is by no means the first warning Jim has issued.
 
Fear not, Linux admins: There are TOOLS to help you  23 July 2012 
Source: The Register UK - Posted by Benjamin D. Thomas   
Most Linux distributions have a significant focus on security. This does not mean they are necessarily ready for production out of the box. Tools like SELinux, excellent firewall options, and robust access controls can make Linux exceptionally secure.
 
Tech Journal: How to Keep Your Accounts Secure  14 June 2012 
Source: Wall Street Journal - Posted by Dave Wreski   
They say the cloud is the future of computing. All your data and software programs, now known as web apps, will reside in the cloud and the computer itself will act as a “dumb” screen. Google is already moving in that direction with Chrome OS, while Microsoft and Apple are working hard to tightly integrate cloud services in their upcoming versions of Windows and Mac OS X, respectively.
 
Experts dispute sandboxing would have stopped Flame  11 June 2012 
Source: InfoWorld - Posted by Anthony Pell   
Bigger lesson learned from Flame: Multiple layers of security needed, so when one technology fails, a second or third may succeed
 
Linux UEFI compromise reasonable, still sucks  08 June 2012 
Source: IT World - Posted by Dave Wreski   
Life is full of trade-offs, and many times they are not palatable for every side. Such was the trade-off proposed by Fedora developers this week to solve the upcoming obstacle of UEFI secure booting on Windows 8-certified machines.
 
<< Start < Prev 4 5 6 Next > End >>

Results 31 - 40 of 934
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Mobile Device Encryption Could Lead to a ‘Very, Very Dark Place’, FBI Director Says
What a hacker can learn about your life from the coffee shop’s Wi-Fi network
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.