Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: April 7th, 2014
Linux Advisory Watch: April 4th, 2014
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Prism doesn't have CIOs in a panic -- yet  18 June 2013 
Source: Network World - Posted by Dave Wreski   
Revelations over the U.S. National Security Agency's Prism surveillance program have much of the general public in uproar, but in terms of the controversy's impact to enterprise IT, some CIOs have measured, albeit watchful reactions.
Our Top-Secret Message to NSA Whistleblower Edward Snowden  17 June 2013 
Source: Wired - Posted by Alex   
Don’t read this if you aren’t him.
Blowback from the NSA Surveillance  17 June 2013 
Source: Schneier on Security - Posted by Dave Wreski   
There's one piece of blowback that isn't being discussed -- aside from the fact that Snowden killed the chances of a liberal arts major getting a job at the DoD for a decade -- and that's how the massive NSA surveillance of the Internet affects the US's role in Internet governance.
NSA Snooping Was Only the Beginning. Meet the Spy Chief Leading Us Into Cyberwar  13 June 2013 
Source: Wired - Posted by Dave Wreski   
Inside Fort Meade, Maryland, a top-secret city bustles. Tens of thousands of people move through more than 50 buildings—the city has its own post office, fire department, and police force. But as if designed by Kafka, it sits among a forest of trees, surrounded by electrified fences and heavily armed guards, protected by antitank barriers, monitored by sensitive motion detectors, and watched by rotating cameras.
Google’s Real Secret Spy Program? Secure FTP  12 June 2013 
Source: Wired - Posted by Dave Wreski   
Google does not participate in any government program involving a lockbox or other equipment installed at its facilities to transfer court-ordered data to the government, a company spokesman says, refuting with some finality one of the lingering theories about the NSA’s PRISM program.
Mozilla, EFF and 86 others launch campaign against surveillance  12 June 2013 
Source: H Security - Posted by Dave Wreski   
Under the banner, the Mozilla Foundation, the EFF and 86 other civil liberties organisations have launched a campaign that calls for "a full accounting of the extent to which our online data, communications and interactions are being monitored".
Government Secrets and the Need for Whistle-blowers  10 June 2013 
Source: Schneier on Security - Posted by Dave Wreski   
Yesterday, we learned that the NSA received all calling records from Verizon customers for a three-month period starting in April. That's everything except the voice content: who called who, where they were, how long the call lasted -- for millions of people, both Americans and foreigners.
NSA snooping bolsters opponents of U.S. Internet control  10 June 2013 
Source: CSO Online - Posted by Dave Wreski   
The National Security Agency's massive data gathering from the world's largest Internet companies could bolster arguments that the United States should have less control over the Internet, an expert says.
White House defends snooping  07 June 2013 
Source: CNET - Posted by Dave Wreski   
The Obama administration calls the NSA's practice of gathering phone records "a critical tool in protecting the nation from terrorist threats," reports the AP and Reuters.
The Problems with CALEA-II  04 June 2013 
Source: Schneier on Security - Posted by Anthony Pell   
The FBI wants a new law that will make it easier to wiretap the Internet. Although its claim is that the new law will only maintain the status quo, it's really much worse than that. This law will result in less-secure Internet products and create a foreign industry in more-secure alternatives.
<< Start < Prev 4 5 6 Next > End >>

Results 51 - 60 of 1260


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
'Snowden effect' has changed cloud data security assumption, survey claims
Galaxy S5 fingerprint scanner hacked with glue mould
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.