LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: December 19th, 2014
Linux Advisory Watch: December 12th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Privacy
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Close-In Surveillance Using Your Phone's Wi-Fi  01 November 2013 
Source: Schneier on Security - Posted by Dave Wreski   
This article talks about applications in retail, but the possibilities are endless. Every smartphone these days comes equipped with a WiFi card. When the card is on and looking for networks to join, it's detectable by local routers.
 
SecureDrop  17 October 2013 
Source: Schneier on Security - Posted by Dave Wreski   
SecureDrop is an open-source whistleblower support system, originally written by Aaron Swartz and now run by the Freedom of the Press Foundation. The first instance of this system was named StrongBox and is being run by the New Yorker.
 
NSA tracks Google ads to find Tor users  08 October 2013 
Source: CNET - Posted by Dave Wreski   
Just because the National Security Agency hasn't cracked the anonymizing service Tor doesn't mean that people who use the service are free from surveillance.
 
Tech firms push for NSA surveillance transparency bills  01 October 2013 
Source: Network World - Posted by Dave Wreski   
The U.S. Congress must act quickly on legislation that would make electronic data collection efforts by the U.S. National Security Agency more public, a group of tech firms, civil liberties groups and other organizations said Monday.
 
Major US security company warns over NSA link to encryption formula  23 September 2013 
Source: The Guardian - Posted by Dave Wreski   
A major American computer security company has told thousands of customers to stop using an encryption system that relies on a mathematical formula developed by the National Security Agency (NSA).
 
NSA ‘Follow the Money’ branch spied on Visa customers, SWIFT transactions  17 September 2013 
Source: RT - Posted by Dave Wreski   
The NSA has been widely monitoring international banking and credit card transactions, a new report says referencing Edward Snowden’s leak. The agency targeted Visa customers and global financial service SWIFT and created its own money flows database.
 
New NSA Leak Shows MITM Attacks Against Major Internet Services  16 September 2013 
Source: Schneier on Security - Posted by Alex   
The Brazilian television show "Fantastico" exposed an NSA training presentation that discusses how the agency runs man-in-the-middle attacks on the Internet. The point of the story was that the NSA engages in economic espionage against Petrobras, the Brazilian giant oil company, but I'm more interested in the tactical details.
 
How to remain secure against NSA surveillance  10 September 2013 
Source: The Guardian - Posted by Anthony Pell   
Now that we have enough details about how the NSA eavesdrops on the internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves.
 
NSA efforts to crack encryption 'betrayed Internet,' expert says  09 September 2013 
Source: Fox News - Posted by Dave Wreski   
Experts on privacy and Internet security have blasted the National Security Agency over reports it has secretly been working with the British government to crack encryption technology that billions of Internet users rely upon to keep their electronic messages and confidential data secure.
 
THE SILENT POWER OF THE N.S.A.  03 September 2013 
Source: NY Times - Posted by Dave Wreski   
David Burnham is a reporter in The Times's Washington bureau. This article is adapted from Mr. Burnham's book ''The Rise of the Computer State,'' to be published by Random House in May.
 
<< Start < Prev 7 8 9 Next > End >>

Results 61 - 70 of 1291
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Report: U.S. planning “proportional response” to Sony hack, blamed on North Korea
Heartbleed, Shellshock, Tor and more: The 13 biggest security stories of 2014
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.