LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: November 21st, 2014
Linux Security Week: November 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Privacy
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Computer forensics the latest ploy to monitor employees  31 October 2000 
Source: Lexis-Nexis - Posted by Benjamin D. Thomas   
Moving beyond merely monitoring employees' Internet use, many of the nation's largest companies are quietly assembling teams of computer investigators who specialize in covertly copying employees' hard drives and combing them for evidence of workplace wrongdoing. These high-tech investigators employ tools . . .
 
Security group alleges breach in bank's Web site  25 October 2000 
Source: News.com - Posted by Dave Wreski   
Customer credit card numbers of Bank One Online are at risk of exposure to malicious hackers, an Internet security group charged Tuesday. The Web site of the fourth-largest U.S. bank lets customers in most cities check their accounts by entering a . . .
 
Net Privacy Bill Called 'Trojan Horse'  25 October 2000 
Source: Washington Post - Posted by Chris Pallack   
The legislation began as an effort to protect people like Amy Boyer, a New Hampshire woman who was slain by a man who tracked her down after buying her Social Security number on the Internet.In May, Sen. Judd Gregg (R-N.H.) proposed . . .
 
Employers can read your email from today  24 October 2000 
Source: ZDNet - Posted by Dave Wreski   
Starting today employers can read workers' email without their consent, but heavyweights including the IoD want changes From Tuesday, new regulations give employers the power to eavesdrop on the email communications of their staff, a legal shift . . .
 
Zero-Knowledge open sources Freedom  24 October 2000 
Source: ZDNet - Posted by Dave Wreski   
Privacy technology firm Zero-Knowledge Systems announced that it had released the code to the Linux version of its privacy software, Freedom 2.0, Monday. Freedom is a client for a network that allows users to browse anonymously. Not even . . .
 
Putting privacy in perspective  23 October 2000 
Source: ZDNet - Posted by Dave Wreski   
There's a lot of sound and fury these days about privacy and the Net -- about how your privacy is going to be seriously compromised soon, if it's not already; about how innovations in cell phones and global positioning satellite systems . . .
 
FBI Still Hunting With Carnivore  23 October 2000 
Source: PCWorld - Posted by Benjamin D. Thomas   
The U.S. Federal Bureau of Investigation is still developing its Carnivore Internet surveillance tool, according to FBI documents obtained by the Electronic Privacy Information Center through a Freedom of Information Act lawsuit. The FBI is now creating "Enhanced Carnivore" under a . . .
 
Mark of Zoro  18 October 2000 
Source: AntiOffline - Posted by Ryan W. Maple   
J. Oquendo contributes: "With the inception of the F.B.I.'s Carnivore, many people have overlooked the fact the C.I.A. is unleashing a tool which makes Carnivore a lightweight contender on the security intervention scene." The article says "watch for more . . .
 
Carnivore: The truth is worse than you thought  18 October 2000 
Source: ZDNet - Posted by Jen Olson   
Carnivore, the FBI's controversial email snooping program, is part of covert surveillance triad known inside the bureau as the "DragonWare Suite", according to recently declassified documents. The documents also outline how the DragonWare Suite is more than . . .
 
Privacy Treaty a Global Invasion?  18 October 2000 
Source: Wired - Posted by Jen Olson   
WASHINGTON -- Civil liberty groups are vexed over a proposed treaty that would grant more surveillance powers to U.S. and European police agencies, and expand copyright crimes. Thirty groups -- from North America, Asia, Africa, Australia and Europe -- said . . .
 
<< Start < Prev 115 116 117 Next > End >>

Results 1161 - 1170 of 1289
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
How to weed out the next Heartbleed bug: ENISA details crypto worries
Attackers Using Compromised Web Plug-Ins in CryptoPHP Blackhat SEO Campaign
Finally, a New Clue to Solve the CIA’s Mysterious Kryptos Sculpture
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.