LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: October 20th, 2014
Linux Advisory Watch: October 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
General Security
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



World's Biggest Data Breaches  20 March 2014 
Source: Information Is Beautiful - Posted by Dave Wreski   
This interactive ‘Balloon Race’ code is powered by our forthcoming VizSweet software – a set of high-end dataviz tools for generating interactive visualisations. We’re currently in pre-alpha.
 
Security: It's knowing what you don't know  10 March 2014 
Source: The Register UK - Posted by Alex   
Some vendors will tell you that security problems are solved by sticking a device on the edge of your network, but we all know that 100 per cent security is a fantasy.
 
Everything You Wanted To Know About Bitcoin  07 February 2014 
Source: Kaspersky - Posted by Alex   
Bitcoin is a cryptocurrency that has gained popularity in the latest months due to the fact that the price has been increasing significantly, catching the mainstream public and media attention. Even though the value of a single currency unit has fallen back quite a bit, it is still a tempting option for many users and cybercriminals alike.
 
How a Math Genius Hacked OkCupid to Find True Love  23 January 2014 
Source: Wired - Posted by Alex   
Chris McKinlay was folded into a cramped fifth-floor cubicle in UCLA’s math sciences building, lit by a single bulb and the glow from his monitor. It was 3 in the morn­ing, the optimal time to squeeze cycles out of the supercomputer in Colorado that he was using for his PhD dissertation.
 
Our 15 favorite quotes from the hacker Jargon File  05 November 2013 
Source: VentureBeat - Posted by Dave Wreski   
I’m so excited to present to you my next-generation enterprise software-as-a-service CRM that also be an on-prem component for safety and security. Did y’all just die a little, too?
 
Wikileaks Drama Getting Hacked at the Box Office  22 October 2013 
Source: Variety - Posted by Dave Wreski   
The mystery of Julian Assange continues as DreamWorks’ Wikileaks drama “The Fifth Estate” looks to be all but M.I.A. at the box office. Bill Condon’s tech-themed feature could spill only $2.4 million worth of secrets this weekend, according to insiders, for one of the worst wide openings of the year.
 
A hacker who helps  10 October 2013 
Source: CNN Money - Posted by Anthony Pell   
John Hering wants to show me something. We're standing at a busy intersection in San Francisco's North Beach neighborhood; he pauses, takes off his black Tom Ford sunglasses, and points to the one-story-tall graffiti art on the side of a building. Next to a boy wearing a gas mask, the tag line reads: "If at first you don't succeed -- call an airstrike."
 
11 Most Notorious And Infamous Black Hat Hackers Ever!  09 October 2013 
Source: EFY Times - Posted by Alex   
Hacking is undoubtedly one of the most adventurous, enticing and mysterious parts of the tech world and we thought it could be even more fun to know and learn about the top tier notorious black hat hackers and the legendary hacks that earned them such a title. So we bring to you the top 11 black hat hackers ever!
 
Meet the Homeless 'Journeyman Hacker' Live via Hangout  25 September 2013 
Source: Mashable - Posted by Anthony Pell   
When a programmer from New York City offered coding lessons to a homeless man he described as a "genius," the Internet reacted with a mixture of support and criticism. Now, for the first time, we have a chance to talk to both teacher and student in an exclusive Google+ Hangout On Air, starting Tuesday at 1 p.m. ET.
 
Apple Developer Forum Hack Explained  23 July 2013 
Source: Information Week - Posted by Dave Wreski   
Turkish security researcher said his bug report wasn't malicious, disputes Apple's claim that attack compromised information on iOS and Mac OS X developers.
 
<< Start < Prev 1 2 3 Next > End >>

Results 11 - 20 of 2449
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
USB is now UEC (use with extreme caution)
iPhone Encryption and the Return of the Crypto Wars
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.