LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: October 24th, 2014
Linux Security Week: October 20th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Privacy
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Pro-Privacy Senator Wyden on Fighting the NSA From Inside the System  23 October 2014 
Source: Wired - Posted by Dave Wreski   
Senator Ron Wyden thought he knew what was going on. The Democrat from Oregon, who has served on the Senate Select Committee on Intelligence since 2001, thought he knew the nature of the National Security Agency’s surveillance activities.
 
Europe's watchdogs give Google a shopping list of how to sort out privacy  25 September 2014 
Source: ZDNet Blogs - Posted by Dave Wreski   
After a series of clashes with Google, Europe's data privacy watchdogs have drawn up a list of measures they'd like to see the search giant implement.
 
Snowden: New Zealand Is Spying, Too  22 September 2014 
Source: Top Tech News - Posted by Dave Wreski   
Former National Security Agency contractor Edward Snowden warned New Zealanders in a media blitz on Monday that all of their private emails, phone calls and text messages are being spied on despite government denials.
 
TOR users become FBI's No.1 hacking target after legal power grab  19 September 2014 
Source: The Register UK - Posted by Dave Wreski   
The FBI wants greater authority to hack overseas computers, according to a law professor. A Department of Justice proposal to amend Rule 41 of the Federal Rules of Criminal Procedure would make it easier for domestic law enforcement to hack into the computers of people attempting to protect their anonymity on the internet.
 
Today's Security Hacks Are After More Than Bank Info  16 September 2014 
Source: Network World - Posted by Anthony Pell   
Customers cringe every time they hear about a bank, retail or healthcare hack that puts personal or financial data at risk. Today's hackers are after much more that credit card numbers, though -- and most firms are powerless to stop them.
 
Inside Google's Secret Drone-Delivery Program  02 September 2014 
Source: The Atlantic - Posted by Anthony Pell   
A zipping comes across the sky. A man named Neil Parfitt is standing in a field on a cattle ranch outside Warwick, Australia. A white vehicle appears above the trees, a tiny plane a bit bigger than a seagull. It glides towards Parfitt, pitches upwards to a vertical position, and hovers near him, a couple hundred feet in the air. From its belly, a package comes tumbling downward, connected by a thin line to the vehicle itself.
 
Hackers Unveil Their Plan to Change Email Forever  11 August 2014 
Source: Time - Posted by Dave Wreski   
"They’re going to keep coming after us,” Ladar Levison, creator of an encrypted email service used by Edward Snowden, said at Defcon on Friday
 
Visit the Wrong Website, and the FBI Could End Up in Your Computer  05 August 2014 
Source: Wired - Posted by Dave Wreski   
Security experts call it a “drive-by download”: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes.
 
Is there Another NSA Leaker? Updated  30 July 2014 
Source: Salon - Posted by Dave Wreski   
This morning a partial analysis of the NSA’s XKEYSCORE code was published in Germany. Jacob Applebaum, an evangelist for the The Onion Project (TOR), was one of the authors. The report details specific rules written for one of the NSA’s data collection tools, XKEYSCORE, which collects the IP addresses of TOR bridges, and users of the TOR network.
 
What I Learned from Edward Snowden at the Hacker Conference  25 July 2014 
Source: Motherboard - Posted by Anthony Pell   
It was 1 PM last Saturday and Edward Snowden was about to be televised. His audience was the crowd at the Hackers On Planet Earth conference, a group of people no one would ever mistake for attendees at a political convention. Amid the sea of black clothing were many unconventional fashion statements: purple bandanas and balloon pants, and tartan kilts, and white robes, and green hair.
 
<< Start < Prev 1 2 3 Next > End >>

Results 1 - 10 of 1284
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Disaster as CryptoWall encrypts US firm's entire server installation
Now Everyone Wants to Sell You a Magical Anonymity Router. Choose Wisely
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.