LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: December 19th, 2014
Linux Advisory Watch: December 12th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
General Security
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



2014 Holiday Gift Guide: The other NSA also knows what you want  10 December 2014 
Source: Network World - Posted by Alex   
Our motto: “He Sees You When You’re Sleeping, He Knows When You’re Awake…” After months of investigations, cups of coffee and several arm-twisting interrogation tactics, the Cool Yule Tools staff of writers and editors has discovered a shocking truth.
 
Hacker Lexicon: What Is the Computer Fraud and Abuse Act?  28 November 2014 
Source: ThreatPost - Posted by Dave Wreski   
In 1984, the world was just emerging from its digital Dark Age. CompuServe, the world’s first commercial email provider, was still trying to interest users in its fledgling service, and computer viruses and worms were still largely the stuff of engineering-school pranks.
 
10 security mistakes that will get you fired  17 November 2014 
Source: Network World - Posted by Alex   
Getting fired from an IT security job is a rare event, but there are certainly ways to ensure or accelerate your own unemployment. I’m not talking about garden-variety mistakes here. After all, most IT workers create or live with lots of little mistakes every day. That’s the nature of complex, rewarding work.
 
Hacker Lexicon: What Is a Zero Day?  13 November 2014 
Source: Wired - Posted by Dave Wreski   
Zero day actually refers to two things—a zero-day vulnerability or a zero-day exploit. Zero-day vulnerability refers to a security hole in software—such as browser software or operating system software—that is yet unknown to the software maker or to antivirus vendors.
 
Australian Federal Police methods under question after 'LulzSec hacker' claims he was wrongly accuse  12 November 2014 
Source: ABC AU - Posted by Dave Wreski   
A 7.30 investigation has found a teenage accomplice was actually responsible for the hack and was raided by police but never charged. Late last month 25-year-old Matthew Flannery was sentenced to 15 months' home detention when he was convicted of five hacking charges.
 
Just where are the world's hackers located?  04 November 2014 
Source: Network World - Posted by Alex   
Well, new studies and reports have been bubbling up over the last month or so, and although I don’t have a definitive answer, I can take a stab at answering his question.
 
BYOD: Why the biggest security worry is the fool within rather than the enemy without  29 October 2014 
Source: ZDNet Blogs - Posted by Alex   
The vast majority – 95 percent – of IT managers are prepared to admit that they are struggling to tackle all the potential security threats they face and 87 percent believe that the biggest threats came from mobile devices in the hands of careless employees, according to a new survey.
 
5 steps to take when a data breach hits  08 October 2014 
Source: CSO Online - Posted by Alex   
No one wants to be the victim of a data breach. As hackers get increasingly sophisticated, though, companies must prepare for the inevitability of such an event. Here security experts share the steps that CIOs and CISOs should take in the hours and days after a breach.
 
The hacker 'skills gap' may be more of a strategy gap  04 September 2014 
Source: CSO Online - Posted by Dave Wreski   
Hackers are succeeding with what appears to be alarming regularity. But that may not be because they are smarter or even better trained than defenders, but because they think, and attack, more strategically
 
The hacker revealed  25 August 2014 
Source: Stuff NZ - Posted by Dave Wreski   
It's a story of hackers and attack bloggers, privacy and paranoia, bombshells and duds. It's rapidly become the story of the election. Rawshark, a self-styled information vigilante, has derailed National's political campaign with his hack of Whale Oil blogger Cameron Slater's private communications and now threatens to up- end the seedier part of corporate public relations.
 
<< Start < Prev 1 2 3 Next > End >>

Results 1 - 10 of 2456
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
Report: U.S. planning “proportional response” to Sony hack, blamed on North Korea
Heartbleed, Shellshock, Tor and more: The 13 biggest security stories of 2014
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.