LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: August 25th, 2014
Linux Advisory Watch: August 15th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Privacy
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



New Ruling Shows the NSA Can’t Legally Justify Its Phone Spying Anymore  13 June 2014 
Source: Wired - Posted by Alex   
The Eleventh Circuit Court of Appeals said no this week to tracking your movements using data from your cell phone without a warrant when it declared that this information is constitutionally protected.
 
Several Governments Have Backdoor Access to Phone Networks, Says Vodafone  06 June 2014 
Source: Wired - Posted by Dave Wreski   
An undisclosed number of countries have direct backdoor access to the communications passing through the network of telecommunications giant Vodafone, without needing to obtain a warrant, according to a new transparency report released by the company.
 
Greenwald to publish list of U.S. citizens NSA spied on  29 May 2014 
Source: Washington Times - Posted by Alex   
Glenn Greenwald, one of the reporters who chronicled the document dump by National Security Agency leaker Edward Snowden via the U.K. press, now said he’s set to publish his most dramatic piece yet: The names of those in the United States targeted by the NSA.
 
Definitely deleted: How to guarantee your data is truly gone before recycling old PCs and drives  19 May 2014 
Source: IT World - Posted by Dave Wreski   
Deleted files can often be recovered, and that's a problem when you're passing your PC or PC-related tech along to someone else. Whether it's sensitive financial data, business documents, or scandalous photos that could be used to blackmail you, you probably don't want people getting their hands on your private stuff.
 
Tails 1.0: A bootable Linux distro that protects your privacy  13 May 2014 
Source: Network World - Posted by Dave Wreski   
These days, it seems as though anyone who uses the Internet is a tasty morsel for insatiable data thieves. Marketers, governments, criminals and random snoops won't be satisfied until they can snarf whatever information they want about us at any time.
 
Correspondence Between the NSA and Google Leaked  08 May 2014 
Source: Schneier on Security - Posted by Alex   
Al Jazeera is reporting on leaked emails (not leaked by Snowden, but by someone else) detailing close ties between the NSA and Google. There are no smoking guns in the correspondence -- and the Al Jazeera article makes more of the e-mails than I think is there -- but it does show a closer relationship than either side has admitted to before.
 
Emails shed light on Google's work with NSA  07 May 2014 
Source: Computer World - Posted by Dave Wreski   
Two sets of emails obtained by Al Jazeera America under a Freedom of Information Act request suggest that Google's cooperation with the National Security Agency (NSA) may have been less coerced than the company has let on.
 
Security guru: You can't blame EDWARD SNOWDEN for making US clouds LOOK leaky  30 April 2014 
Source: The Register UK - Posted by Alex   
Accusations that the revelations from rogue National Security Agency sysadmin whistleblower Edward Snowden have damaged the US technology industry are misplaced, according to influential security guru Mikko Hypponen.
 
Has the NSA Been Using the Heartbleed Bug as an Internet Peephole?  11 April 2014 
Source: Wired - Posted by Dave Wreski   
When ex-government contractor Edward Snowden exposed the NSA’s widespread efforts to eavesdrop on the internet, encryption was the one thing that gave us comfort. Even Snowden touted encryption as a saving grace in the face of the spy agency’s snooping. “Encryption works,” the whistleblower said last June.
 
Wild at Heart: Were Intelligence Agencies Using Heartbleed in November 2013?  10 April 2014 
Source: EFF - Posted by Dave Wreski   
Yesterday afternoon, Ars Technica published a story reporting two possible logs of Heartbleed attacks occurring in the wild, months before Monday's public disclosure of the vulnerability. It would be very bad news if these stories were true, indicating that blackhats and/or intelligence agencies may have had a long period when they knew about the attack and could use it at their leisure.
 
<< Start < Prev 1 2 3 Next > End >>

Results 11 - 20 of 1278
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.