Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: February 27th, 2015
Linux Security Week: February 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Putting privacy in perspective  23 October 2000 
Source: ZDNet - Posted by Dave Wreski   
There's a lot of sound and fury these days about privacy and the Net -- about how your privacy is going to be seriously compromised soon, if it's not already; about how innovations in cell phones and global positioning satellite systems . . .
FBI Still Hunting With Carnivore  23 October 2000 
Source: PCWorld - Posted by Benjamin D. Thomas   
The U.S. Federal Bureau of Investigation is still developing its Carnivore Internet surveillance tool, according to FBI documents obtained by the Electronic Privacy Information Center through a Freedom of Information Act lawsuit. The FBI is now creating "Enhanced Carnivore" under a . . .
Mark of Zoro  18 October 2000 
Source: AntiOffline - Posted by Ryan W. Maple   
J. Oquendo contributes: "With the inception of the F.B.I.'s Carnivore, many people have overlooked the fact the C.I.A. is unleashing a tool which makes Carnivore a lightweight contender on the security intervention scene." The article says "watch for more . . .
Carnivore: The truth is worse than you thought  18 October 2000 
Source: ZDNet - Posted by Jen Olson   
Carnivore, the FBI's controversial email snooping program, is part of covert surveillance triad known inside the bureau as the "DragonWare Suite", according to recently declassified documents. The documents also outline how the DragonWare Suite is more than . . .
Privacy Treaty a Global Invasion?  18 October 2000 
Source: Wired - Posted by Jen Olson   
WASHINGTON -- Civil liberty groups are vexed over a proposed treaty that would grant more surveillance powers to U.S. and European police agencies, and expand copyright crimes. Thirty groups -- from North America, Asia, Africa, Australia and Europe -- said . . .
Bush, Gore Differ On Consumer Privacy Protection  18 October 2000 
Source: Techweb - Posted by Benjamin D. Thomas   
Both major presidential candidates believe that more must be done to protect Internet privacy, but they differ on exactly what should be done, their campaign representatives said Monday. Privacy hasn't been an issue in the presidential debates, despite surveys showing consumers . . .
EarthLink flaw exposes domains  17 October 2000 
Source: ZDNet - Posted by Dave Wreski   
A one-two punch of poor security left up to 81,000 domains hosted by Internet service provider EarthLink Inc. open to defacement and exploitation for at least a week, ZDNet News learned on Tuesday. The vulnerability resulted from a recently discovered flaw . . .
Mitnick backs federal DNA database  16 October 2000 
Source: ZDNet - Posted by Dave Wreski   
Should the Government establish a central database that uses biometric identifiers such as DNA to make sure you're who you say you are? Hacker Kevin Mitnick thinks so. "I think the government has to establish some sort of central database that . . .
FBI's Carnivore Just the First Step in Internet Surveillance  16 October 2000 
Source: Fox News - Posted by Dave Wreski   
The FBI says its controversial Carnivore system is just "the tip of the iceberg" when it comes to Internet surveillance because an even sharper-toothed information chomper is now in development. . . .
Privacy expert monitors issue with a keen eye  13 October 2000 
Source: CNET - Posted by Benjamin D. Thomas   
Richard Smith has dedicated himself to demanding high security and privacy standards of Internet companies. A veteran computer programmer, Smith knows how information collected through technology can be manipulated in ways the developer never intended. Currently the chief technology officer at . . .
<< Start < Prev 118 119 120 Next > End >>

Results 1181 - 1190 of 1304


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Why Silicon Valley Hackers Still Won’t Work With the Military, and Vice Versa
Bad movie: Hackers can raid networks with burnt Blu-Rays
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.