LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: November 21st, 2014
Linux Security Week: November 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Server Security
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



10 security mistakes that will get you fired  17 November 2014 
Source: Network World - Posted by Alex   
Getting fired from an IT security job is a rare event, but there are certainly ways to ensure or accelerate your own unemployment. I’m not talking about garden-variety mistakes here. After all, most IT workers create or live with lots of little mistakes every day. That’s the nature of complex, rewarding work.
 
Hacker Lexicon: What Is a Zero Day?  13 November 2014 
Source: Wired - Posted by Dave Wreski   
Zero day actually refers to two things—a zero-day vulnerability or a zero-day exploit. Zero-day vulnerability refers to a security hole in software—such as browser software or operating system software—that is yet unknown to the software maker or to antivirus vendors.
 
Australian Federal Police methods under question after 'LulzSec hacker' claims he was wrongly accuse  12 November 2014 
Source: ABC AU - Posted by Dave Wreski   
A 7.30 investigation has found a teenage accomplice was actually responsible for the hack and was raided by police but never charged. Late last month 25-year-old Matthew Flannery was sentenced to 15 months' home detention when he was convicted of five hacking charges.
 
Just where are the world's hackers located?  04 November 2014 
Source: Network World - Posted by Alex   
Well, new studies and reports have been bubbling up over the last month or so, and although I don’t have a definitive answer, I can take a stab at answering his question.
 
BYOD: Why the biggest security worry is the fool within rather than the enemy without  29 October 2014 
Source: ZDNet Blogs - Posted by Alex   
The vast majority – 95 percent – of IT managers are prepared to admit that they are struggling to tackle all the potential security threats they face and 87 percent believe that the biggest threats came from mobile devices in the hands of careless employees, according to a new survey.
 
5 steps to take when a data breach hits  08 October 2014 
Source: CSO Online - Posted by Alex   
No one wants to be the victim of a data breach. As hackers get increasingly sophisticated, though, companies must prepare for the inevitability of such an event. Here security experts share the steps that CIOs and CISOs should take in the hours and days after a breach.
 
The hacker 'skills gap' may be more of a strategy gap  04 September 2014 
Source: CSO Online - Posted by Dave Wreski   
Hackers are succeeding with what appears to be alarming regularity. But that may not be because they are smarter or even better trained than defenders, but because they think, and attack, more strategically
 
The hacker revealed  25 August 2014 
Source: Stuff NZ - Posted by Dave Wreski   
It's a story of hackers and attack bloggers, privacy and paranoia, bombshells and duds. It's rapidly become the story of the election. Rawshark, a self-styled information vigilante, has derailed National's political campaign with his hack of Whale Oil blogger Cameron Slater's private communications and now threatens to up- end the seedier part of corporate public relations.
 
The character assassination of Keith Alexander  30 June 2014 
Source: Errata Security - Posted by Dave Wreski   
According to these stories, a Congressman wants to know if former NSA chief Gen. Keith Alexander is selling classified info to banks. There is nothing to this story. It’s gossip based on upon rumor based on speculation based on innuendo. It’s such obvious character assassination that I shouldn’t have to write a blog post debunking it, but apparently you people have gone insane.
 
“The Internet’s Own Boy”: How the government destroyed Aaron Swartz  25 June 2014 
Source: Salon - Posted by Dave Wreski   
Brian Knappenberger’s Kickstarter-funded documentary “The Internet’s Own Boy: The Story of Aaron Swartz,” which premiered at Sundance barely a year after the legendary hacker, programmer and information activist took his own life in January 2013, feels like the beginning of a conversation about Swartz and his legacy rather than the final word.
 
<< Start < Prev 1 2 3 Next > End >>

Results 1 - 10 of 2454
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
How to weed out the next Heartbleed bug: ENISA details crypto worries
Attackers Using Compromised Web Plug-Ins in CryptoPHP Blackhat SEO Campaign
Finally, a New Clue to Solve the CIA’s Mysterious Kryptos Sculpture
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.