LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: January 23rd, 2015
Linux Advisory Watch: January 16th, 2015
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
General Security
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Is Blackhat the Greatest Hacking Movie Ever? Hackers Think So  16 January 2015 
Source: Wired - Posted by Dave Wreski   
The scene doesn’t include a keyboard. Or a computer mouse. But it shows why Michael Mann’s Blackhat may be the best hacker movie ever made.
 
The Biggest Security Threats We’ll Face in 2015  05 January 2015 
Source: Wired - Posted by Alex   
As the clock strikes midnight on the new year, so begins the countdown to a new round of security threats and breaches that doubtless will unfold in 2015. But this year will be a little different. In the past, when we’ve talked about threat predictions, we’ve focused either on the criminal hackers out to steal credit card data and banking passwords or on the activist hackers out for the lulz (and maybe to teach corporate victims a lesson).
 
2014 Holiday Gift Guide: The other NSA also knows what you want  10 December 2014 
Source: Network World - Posted by Alex   
Our motto: “He Sees You When You’re Sleeping, He Knows When You’re Awake…” After months of investigations, cups of coffee and several arm-twisting interrogation tactics, the Cool Yule Tools staff of writers and editors has discovered a shocking truth.
 
Hacker Lexicon: What Is the Computer Fraud and Abuse Act?  28 November 2014 
Source: ThreatPost - Posted by Dave Wreski   
In 1984, the world was just emerging from its digital Dark Age. CompuServe, the world’s first commercial email provider, was still trying to interest users in its fledgling service, and computer viruses and worms were still largely the stuff of engineering-school pranks.
 
10 security mistakes that will get you fired  17 November 2014 
Source: Network World - Posted by Alex   
Getting fired from an IT security job is a rare event, but there are certainly ways to ensure or accelerate your own unemployment. I’m not talking about garden-variety mistakes here. After all, most IT workers create or live with lots of little mistakes every day. That’s the nature of complex, rewarding work.
 
Hacker Lexicon: What Is a Zero Day?  13 November 2014 
Source: Wired - Posted by Dave Wreski   
Zero day actually refers to two things—a zero-day vulnerability or a zero-day exploit. Zero-day vulnerability refers to a security hole in software—such as browser software or operating system software—that is yet unknown to the software maker or to antivirus vendors.
 
Australian Federal Police methods under question after 'LulzSec hacker' claims he was wrongly accuse  12 November 2014 
Source: ABC AU - Posted by Dave Wreski   
A 7.30 investigation has found a teenage accomplice was actually responsible for the hack and was raided by police but never charged. Late last month 25-year-old Matthew Flannery was sentenced to 15 months' home detention when he was convicted of five hacking charges.
 
Just where are the world's hackers located?  04 November 2014 
Source: Network World - Posted by Alex   
Well, new studies and reports have been bubbling up over the last month or so, and although I don’t have a definitive answer, I can take a stab at answering his question.
 
BYOD: Why the biggest security worry is the fool within rather than the enemy without  29 October 2014 
Source: ZDNet Blogs - Posted by Alex   
The vast majority – 95 percent – of IT managers are prepared to admit that they are struggling to tackle all the potential security threats they face and 87 percent believe that the biggest threats came from mobile devices in the hands of careless employees, according to a new survey.
 
5 steps to take when a data breach hits  08 October 2014 
Source: CSO Online - Posted by Alex   
No one wants to be the victim of a data breach. As hackers get increasingly sophisticated, though, companies must prepare for the inevitability of such an event. Here security experts share the steps that CIOs and CISOs should take in the hours and days after a breach.
 
<< Start < Prev 1 2 3 Next > End >>

Results 1 - 10 of 2458
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.