Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: November 21st, 2014
Linux Security Week: November 17th, 2014
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Spamhaus readies new antimalware data feeds  16 June 2014 
Source: TechWorld - Posted by Dave Wreski   
The Spamhaus Project will soon publish two new data feeds intended to prevent people from being lured to malware-infected websites and domains.
Keep an eye on these 5 new features in RHEL 7  13 June 2014 
Source: InfoWorld - Posted by Dave Wreski   
After six-plus months of public beta testing and more than three years after its previous major point release, RHEL (Red Hat Enterprise Linux) version 7 is out. The update speaks to Red Hat's interests in outfitting RHEL with many of the latest enterprise and data center features. Here are the five top-of-the-line new additions to RHEL 7 that caught our eyes.
Become a next-generation security expert  22 January 2014 
Source: Kaspersky - Posted by Anthony Pell   
For six years now Kaspersky Lab has been helping students from Russia and the CIS to find their feet in the world and establish themselves professionally. We have accumulated a wealth of experience in that time and not one of the students participating in our programs has gone unnoticed.
Linux: The clear choice for security  17 January 2014 
Source: Tech Republic - Posted by Dave Wreski   
According to the UK's Communications-Electronics Security Group (CESG), Linux is the clear choice when it comes to security.
Linux Kernel, Font Bugs Fixed in Ubuntu  09 January 2014 
Source: ThreatPost - Posted by Dave Wreski   
A huge number of security vulnerabilities have been fixed in Ubuntu, including a remotely exploitable font flaw that an attacker could use to run arbitrary code on vulnerable machines.
A clear-eyed guide to Android's actual security risks  17 December 2013 
Source: InfoWorld - Posted by Alex   
If you're an Android user -- or want to be -- you've likely heard about all the security risks of Google's mobile operating system. But how real are these threats, and how much damage can they do? Despite the fears, are Android devices actually a safe bet for an enterprise mobility strategy?
Mozilla releases 10 patches, five critical, for Firefox  30 October 2013 
Source: Network World - Posted by Dave Wreski   
Mozilla released 10 patches for three versions of its Firefox browser on Tuesday, five of which are considered critical and could be used to remotely install malicious code.
Post-Funding Round, Skycure Launches Its Mobile Hacker Detection Software  18 October 2013 
Source: Tech Crunch - Posted by Alex   
Last year we covered the news that Skycure Ė a Bring Your Own Device security startup Ė had raised $3 million in a round lead by Israeli VC Pitango. Itís now launched a new suite of threat detection software that it says monitors network traffic to address suspicious behaviour on user devices.
Rising use of cloud drives growth in security software  05 September 2013 
Source: National Multimedia - Posted by Anthony Pell   
Thai companies are providing a broader range of security products and solutions in light of the increasing threat of cyber-attacks on the business sector, with new offerings contributing to estimated security-software market growth of 16 per cent this year.
Body hacker uses subdermal RFID hand implant as wireless storage  23 August 2013 
Source: ExtremeTech - Posted by Dave Wreski   
In modern times, a portable storage device isnít ever far from our possession. Either we can use the storage on our phones or tablets, or we keep a small flash drive on a keychain. Accessing the data, however, may not be convenient in a given situation.
<< Start < Prev 1 2 3 Next > End >>

Results 11 - 20 of 1225


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
Google Releases Open Source Tool for Testing Web App Security Scanners
Most Targeted Attacks Exploit Privileged Accounts
NotCompable sets new standards for mobile botnet sophistication
Hands on with Caine Linux: Pentesting and UEFI compatible
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.