LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: September 15th, 2014
Linux Security Week: September 8th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Privacy
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Has the NSA Been Using the Heartbleed Bug as an Internet Peephole?  11 April 2014 
Source: Wired - Posted by Dave Wreski   
When ex-government contractor Edward Snowden exposed the NSA’s widespread efforts to eavesdrop on the internet, encryption was the one thing that gave us comfort. Even Snowden touted encryption as a saving grace in the face of the spy agency’s snooping. “Encryption works,” the whistleblower said last June.
 
Wild at Heart: Were Intelligence Agencies Using Heartbleed in November 2013?  10 April 2014 
Source: EFF - Posted by Dave Wreski   
Yesterday afternoon, Ars Technica published a story reporting two possible logs of Heartbleed attacks occurring in the wild, months before Monday's public disclosure of the vulnerability. It would be very bad news if these stories were true, indicating that blackhats and/or intelligence agencies may have had a long period when they knew about the attack and could use it at their leisure.
 
Why Privacy Is Actually Thriving Online  31 March 2014 
Source: Wired - Posted by Alex   
Privacy is dead—or so we’re told, both by those who would mourn the loss and by those who would dance on its grave. And the murderers aren’t just the NSA and snooping corporations. We too have played a part in privacy’s demise, through our embrace of mass exhibitionism.
 
NSA hacked into servers at Huawei headquarters, reports say  24 March 2014 
Source: Network World - Posted by Dave Wreski   
The U.S. National Security Agency has hacked into Huawei Technologies servers, spied on communications of company executives and collected information to plant so-called backdoors on equipment from the Chinese networking manufacturer, according to reports published over the weekend.
 
Google Encrypts Web Searches To Fight Spying, Censorship  17 March 2014 
Source: Top Tech News - Posted by Dave Wreski   
Spying by the NSA, its British counterpart, the GCHQ, and other organizations pushed Google to expand encryption, but protecting searches still falls short of encrypting other important and widely used services like Gmail. However, Google's decision to encrypt searches is a good start, said Charles King, principal analyst with Pund-It.
 
A Close Look at the NSA’s Most Powerful Internet Attack Tool  13 March 2014 
Source: Wired - Posted by Anthony Pell   
We already knew that the NSA has weaponized the internet, enabling it to “shoot” exploits at anyone it desires. A single web fetch, imitated by an identified target, is sufficient for the NSA to exploit its victim.
 
US court disallows NSA from holding phone records beyond five years  10 March 2014 
Source: IT World - Posted by Anthony Pell   
The secret Foreign Intelligence Surveillance Court has ruled against a U.S. government request that it be allowed to hold telephone metadata beyond the current five-year limit as it may be required as evidence in civil lawsuits that question the data collection.
 
Judges Poised to Hand U.S. Spies the Keys to the Internet  03 February 2014 
Source: Wired - Posted by Alex   
How does the NSA get the private crypto keys that allow it to bulk eavesdrop on some email providers and social networking sites? It’s one of the mysteries yet unanswered by the Edward Snowden leaks.
 
If You Used This Secure Webmail Site, the FBI Has Your Inbox  27 January 2014 
Source: Wired - Posted by Alex   
While investigating a hosting company known for sheltering child porn last year the FBI incidentally seized the entire e-mail database of a popular anonymous webmail service called TorMail. Now the FBI is tapping that vast trove of e-mail in unrelated investigations.
 
Obama in awkward spot after privacy board calls NSA snooping illegal  24 January 2014 
Source: Network World - Posted by Anthony Pell   
A report Thursday by the Privacy and Civil Liberties Oversight Board (PCLOB) calling the National Security Agency's bulk phone records collection program illegal and mostly useless puts the Obama Administration in an awkward spot.
 
<< Start < Prev 1 2 3 Next > End >>

Results 21 - 30 of 1280
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Infosec geniuses hack a Canon PRINTER and install DOOM
How network virtualization is used as a security tool
Here's What Hackers Can Do With Your CRM Data
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.