LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: December 19th, 2014
Linux Advisory Watch: December 12th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
General Security
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



The seven levels of cyber security hacking explained  24 February 2012 
Source: Business7 - Posted by Dave Wreski   
Much to the disappointment of the cyber security boffins who dedicate their professional lives to making the internet a safer place for us to enjoy, awareness of online security threats amongst the average computer user is extremely low.
 
Passwords aren't dead, though maybe yours should be  09 January 2012 
Source: CSO Online - Posted by Dave Wreski   
It's 2012. The password is dead. Long live the password. Perhaps the division in the IT world is not quite that stark, but there is indeed division. Some think it is past time to retire passwords, for what they say is the obvious reason: They don't protect users, since they are so easily hacked.
 
Database Security's Biggest Problem: People  12 December 2011 
Source: Information Week - Posted by Anthony Pell   
As more organizations act to protect data at its most fundamental state, within the database, one of the biggest challenges that they run into is a people problem. In order to truly mitigate data risks, security teams need to learn to not only play nice with their database administrators, but to make them meaningful stakeholders in securing the databases they're entrusted to manage.
 
Hackers spent a lot of their time educating other hackers  17 October 2011 
Source: VentureBeat - Posted by Dave Wreski   
Hackers spent about 25 percent of their time in forums educating other hackers about beginner tips, according to a survey by cyber security firm Imperva.
 
What is a hacker?  27 September 2011 
Source: ZDNet Blogs - Posted by Anthony Pell   
The definition for the term hacker is as elusive as those who earn the moniker. Find out from the accepted source what a hacker really is. If you don’t know exactly what a hacker is, join the club.
 
What's a Company's Biggest Security Risk? You.  26 September 2011 
Source: Wall Street Journal - Posted by Anthony Pell   
We are the weakest link. Hacking attacks against companies are growing bigger and bolder—witness a string of high-profile breaches this year at Sony Corp., Citigroup Inc. and others. But gone are the days when hackers would simply find holes in corporate networks to steal valuable data.
 
14 Enterprise Security Tips From Anonymous Hacker  01 September 2011 
Source: Information Week - Posted by Dave Wreski   
Want to avoid large-scale data breaches of the type served up by hacking group Anonymous, and its LulzSec and AntiSec offshoots? Start by paying attention to the security basics, including hiring good people and training employees to be security-savvy.
 
10 Largest Hacker Attacks  07 July 2011 
Source: MSNBC - Posted by Alex   
We have entered a golden age for the nefarious world of hackers. According to a recent study published by Verizon and the U.S. Secret Service, incidents of data compromise climbed more than 400 percent in 2010 from the previous year to 761 breaches.
 
Stuxnet: Anatomy of a Computer Virus  16 June 2011 
Source: Short of the Week - Posted by Alex   
Stumbled across this today in my Vimeo inbox. A very cool motion graphics piece that is “An infographic dissecting the nature and ramifications of Stuxnet, the first weapon made entirely out of code.” Our Facebook fans seemed to respond well to it, so I thought I’d put it up as a Short of the Moment.
 
Hacker Liability: How at Risk is Your Company?  24 May 2011 
Source: Fox Business - Posted by Anthony Pell   
From MasterCard and Twitter to TJMaxx and Sony, companies of all sizes are under attack from hackers. The threat of these attacks has escalated to such a degree that many cybersecurity professionals will admit it is almost impossible to prevent them 100% of the time.
 
<< Start < Prev 4 5 6 Next > End >>

Results 51 - 60 of 2456
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Report: U.S. planning “proportional response” to Sony hack, blamed on North Korea
Heartbleed, Shellshock, Tor and more: The 13 biggest security stories of 2014
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.