Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

General Security
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Web Sites Race to Buy Hacker Insurance  22 February 2000 
Source: -   - Posted by Team   
"It may be impossible for even the most fortified Internet companies to ensure their Web sites will not be hacked, but they can always insure themselves against losses from unwanted intrusions. That's right: hacker insurance. Such policies have been . . .
Mixter to be interviewed on today!  21 February 2000 
Source: SecurityFocus - Posted by Team   
Mixter, the author of Tribe Flood Network and Tribe Flood Network 2000, has agreed to do an interview on TFN and TFN2k are two of the DDoS tools that may have been used in the recent widespread attacks. . . .
Two Face Felony Charges In Software Theft  21 February 2000 
Source: Channel4000 (Found on SecurityFocus) - Posted by Team   
Fifteen felony charges have been filed against a Twin Cities-area man and woman who used computers to steal confidential, proprietary information from two companies, apparently by obtaining passwords using L0phtCrack. . . .
Security Issues Put Hillary in a Bind  21 February 2000 
Source: NY Daily News -   - Posted by Team   
Here is an amusing article ... "In her interview with the Sunday News, the First Lady confessed she does not yet have her own computer, has never surfed the Web and has not yet made an online purchase. The . . .
Web Security and Washington's Credibility Gap  20 February 2000 
Source: PCWeek - Posted by Team   
Jeff Moad from PC Week writes, "It's probably not surprising that, even while last week's denial-of-service attacks were raging across the Web, the conspiracy theories already were beginning. While some investigators in search of culprits pointed fingers at hackers . . .
Internet Private Eyes Hinder FBI Hunt for Hackers  19 February 2000 
Source: - Patrick Riley   - Posted by Team   
Patrick Riley writes..."The FBI's probe into last week's attacks on major Web sites has just begun, but it is already running into numerous problems, including false leads and interference from the burgeoning Internet Security field." . . .
Could Microsoft open source code to settle?  18 February 2000 
Source: (From Bloomberg) - Posted by Team   
This one doesn't exactly sit too well with me.. Reportedly, "Microsoft would be willing to open the source code for its Windows software to competitors if that was all it would take to settle the antitrust case filed by the . . .
FBI's Computer Cases Quadruple Since Last Week  17 February 2000 
Source: (AP)-    - Posted by Team   
It seems like businesses are realizing now that breaches should be reported ... "The number of newly opened FBI computer-hacking investigations has quadrupled since the first electronic commerce sites were attacked last week. Investigators theorize copycats may have emerged . . .
CIA Develops Program to Identify Cyber Attacks  17 February 2000 
Source: - Barbara Starr    - Posted by Team   
The saga continues. Barbara Starr writes..."While the FBI continues to question suspects in last week’s wave of vandalism on the Web, the CIA has been quietly working on a new computer program that would help all users protect themselves . . .
Canadian officials search for hacker in cyberattacks  17 February 2000 
Posted by Team   
Canadian law officials have investigated a Montreal-based Internet service provider in an attempt to gather information about a suspected hacker that could have been involved in recent cyberattacks on some of the Net’s leading Web sites. . . .
<< Start < Prev 241 242 243 Next > End >>

Results 2421 - 2430 of 2459


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
FBI Quietly Removes Recommendation To Encrypt Your Phone
And the prize for LEAST SECURE BROWSER goes to ... Chrome!
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.