Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: September 15th, 2014
Linux Security Week: September 8th, 2014
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Pirate Bay’s Anti-Censorship Browser Clocks 100,000 Downloads  14 August 2013 
Source: TorrentFreak - Posted by Dave Wreski   
Within three days of its launch The Pirate Bay’s PirateBrowser, which allows people to bypass ISP filtering and access blocked websites, has already been downloaded more than 100,000 times. The Pirate Bay team say they never expected the browser to catch on this quickly, while noting that they are determined to provide more anti-censorship tools.
Pirate Bay Introduces Web Browser to Elude Censorship  12 August 2013 
Source: CIO - Posted by Dave Wreski   
The Pirate Bay introduced its own browser that can be used to circumvent censorship and blockades.
Did Edward Snowden cause the shutdown of secure email service Lavabit?  09 August 2013 
Source: Beta News - Posted by Dave Wreski   
Privacy has been a red hot topic for the past couple of months -- ever since the whole PRISM story hit the news, or shall I say slammed into the news. Nobody likely denies the government the right to attempt to keep citizens safe. In fact, we expect this from it.
Does the NSA's SE Linux code need a review?  25 July 2013 
Source: IT Wire - Posted by Dave Wreski   
In the wake of the recent revelations that America's National Security Agency is spying on all and sundry, is it time for the Linux community to take another good, hard look at the NSA-developed Security Enhanced Linux?
A Problem with the US Privacy and Civil Liberties Oversight Board  16 July 2013 
Source: Schneier on Security - Posted by Dave Wreski   
I haven't heard much about the Privacy and Civil Liberties Oversight Board. They recently held hearings regarding the Snowden documents.
In WikiLeaks Probe, Feds Used a Secret Search Warrant to Get Volunteer’s Gmail  24 June 2013 
Source: Wired - Posted by Alex   
The Justice Department used a secret search warrant to obtain the entire contents of a Gmail account used by a former WikiLeaks volunteer in Iceland, according to court records released to the volunteer this week.
5 Fun Facts From the Latest NSA Leak  21 June 2013 
Source: Wired - Posted by Dave Wreski   
After a brief respite, the Guardian newspaper has resumed its publication of leaked NSA documents. The latest round provides a look at the secret rules the government follows for collecting data on U.S. persons. We found a number of interesting disclosures in two documents released by the newspaper. Among them:
It's over: All private data is public  20 June 2013 
Source: InfoWorld - Posted by Dave Wreski   
This is not another article explaining that Google and Facebook already know everything about us or that our governments sniff all our Internet transmissions. That's true, but it's just the tip of the iceberg.
3 Questions About NSA Surveillance  19 June 2013 
Source: Chronicle - Posted by Dave Wreski   
A number of questions have been raised in the last few days about the civil-liberties implications of the National Security Agency’s seven-year-old programs to gather data on telephone and e-mail conversations—the programs characterized by President Obama on Friday as “modest encroachments” on privacy.
Prism doesn't have CIOs in a panic -- yet  18 June 2013 
Source: Network World - Posted by Dave Wreski   
Revelations over the U.S. National Security Agency's Prism surveillance program have much of the general public in uproar, but in terms of the controversy's impact to enterprise IT, some CIOs have measured, albeit watchful reactions.
<< Start < Prev 7 8 9 Next > End >>

Results 61 - 70 of 1279


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
Apache Warns of Tomcat Remote Code Execution Vulnerability
Cloud security: We're asking the wrong questions
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.