Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: July 28th, 2014
Linux Advisory Watch: July 25th, 2014
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

A Problem with the US Privacy and Civil Liberties Oversight Board  16 July 2013 
Source: Schneier on Security - Posted by Dave Wreski   
I haven't heard much about the Privacy and Civil Liberties Oversight Board. They recently held hearings regarding the Snowden documents.
In WikiLeaks Probe, Feds Used a Secret Search Warrant to Get Volunteer’s Gmail  24 June 2013 
Source: Wired - Posted by Alex   
The Justice Department used a secret search warrant to obtain the entire contents of a Gmail account used by a former WikiLeaks volunteer in Iceland, according to court records released to the volunteer this week.
5 Fun Facts From the Latest NSA Leak  21 June 2013 
Source: Wired - Posted by Dave Wreski   
After a brief respite, the Guardian newspaper has resumed its publication of leaked NSA documents. The latest round provides a look at the secret rules the government follows for collecting data on U.S. persons. We found a number of interesting disclosures in two documents released by the newspaper. Among them:
It's over: All private data is public  20 June 2013 
Source: InfoWorld - Posted by Dave Wreski   
This is not another article explaining that Google and Facebook already know everything about us or that our governments sniff all our Internet transmissions. That's true, but it's just the tip of the iceberg.
3 Questions About NSA Surveillance  19 June 2013 
Source: Chronicle - Posted by Dave Wreski   
A number of questions have been raised in the last few days about the civil-liberties implications of the National Security Agency’s seven-year-old programs to gather data on telephone and e-mail conversations—the programs characterized by President Obama on Friday as “modest encroachments” on privacy.
Prism doesn't have CIOs in a panic -- yet  18 June 2013 
Source: Network World - Posted by Dave Wreski   
Revelations over the U.S. National Security Agency's Prism surveillance program have much of the general public in uproar, but in terms of the controversy's impact to enterprise IT, some CIOs have measured, albeit watchful reactions.
Our Top-Secret Message to NSA Whistleblower Edward Snowden  17 June 2013 
Source: Wired - Posted by Alex   
Don’t read this if you aren’t him.
Blowback from the NSA Surveillance  17 June 2013 
Source: Schneier on Security - Posted by Dave Wreski   
There's one piece of blowback that isn't being discussed -- aside from the fact that Snowden killed the chances of a liberal arts major getting a job at the DoD for a decade -- and that's how the massive NSA surveillance of the Internet affects the US's role in Internet governance.
NSA Snooping Was Only the Beginning. Meet the Spy Chief Leading Us Into Cyberwar  13 June 2013 
Source: Wired - Posted by Dave Wreski   
Inside Fort Meade, Maryland, a top-secret city bustles. Tens of thousands of people move through more than 50 buildings—the city has its own post office, fire department, and police force. But as if designed by Kafka, it sits among a forest of trees, surrounded by electrified fences and heavily armed guards, protected by antitank barriers, monitored by sensitive motion detectors, and watched by rotating cameras.
Google’s Real Secret Spy Program? Secure FTP  12 June 2013 
Source: Wired - Posted by Dave Wreski   
Google does not participate in any government program involving a lockbox or other equipment installed at its facilities to transfer court-ordered data to the government, a company spokesman says, refuting with some finality one of the lingering theories about the NSA’s PRISM program.
<< Start < Prev 7 8 9 Next > End >>

Results 61 - 70 of 1275


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
DARPA-derived secure microkernel goes open source tomorrow
Hacker Gary McKinnon turns into a search expert
Hackers seed Amazon cloud with potent denial-of-service bots
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.