LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 21st, 2014
Linux Security Week: April 7th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Government
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Obama selects cryptologist to head US NSA  31 January 2014 
Source: TechWorld - Posted by Dave Wreski   
U.S. President Barack Obama has nominated an expert cryptologist to head the National Security Agency at a time when the agency is under pressure to reform its surveillance.
 
Bitcoin Exchange CEO Charged With Laundering $1 Million Through Silk Road  29 January 2014 
Source: Wired - Posted by Alex   
The CEO of Bitcoin exchanger BitInstant has been arrested and charged with money laundering over allegations that he and another man sold more than $1 million in Bitcoins to buyers and sellers of drugs on the underground drug site Silk Road.
 
I Spent Two Hours Talking With NSA’s Big Wigs. Here’s What’s Got Them Mad  13 January 2014 
Source: Wired - Posted by Dave Wreski   
My expectations were low when I asked the National Security Agency to cooperate with my story on the impact of Edward Snowden’s leaks on the tech industry. During the 1990s, I had been working on a book, Crypto, which dove deep into cryptography policy, and it took me years — years! — to get an interview with an employee crucial to my narrative.
 
How the NSA Almost Killed the Internet  09 January 2014 
Source: Wired - Posted by Dave Wreski   
Google, Facebook, Microsoft, and the other tech titans have had to fight for their lives against their own government. An exclusive look inside their year from hell—and why the Internet will never be the same.
 
Would NSA surveillance have stopped 9/11 plot?  31 December 2013 
Source: CNN Security - Posted by Alex   
The Obama administration has framed its defense of the controversial bulk collection of all American phone records as necessary to prevent a future 9/11.
 
Hacker sentenced to 18 months for peddling computer access to US national security lab  13 December 2013 
Source: Network World - Posted by Alex   
A Pennsylvania man who hacked into multiple corporate, university and government computer networks and tried to sell access to them, including supercomputers from a U.S. national security laboratory, has been sentenced to 18 months in prison.
 
DARPA makes finding software vulnerabilities fun  09 December 2013 
Source: Network World - Posted by Anthony Pell   
The U.S. Department of Defense may have found a new way to scan millions of lines of software code for vulnerabilities, by turning the practice into a set of video games and puzzles and having volunteers do the work.
 
Our Government Has Weaponized the Internet. Here’s How They Did It  29 November 2013 
Source: Wired - Posted by Alex   
The internet backbone — the infrastructure of networks upon which internet traffic travels — went from being a passive infrastructure for communication to an active weapon for attacks.
 
FBI sends memo to US.gov sysadmins: You've been hacked... for the past YEAR  19 November 2013 
Source: The Register UK - Posted by Alex   
Hacktivists allegedly affiliated with Anonymous have been covertly breaking into US government systems and pilfering sensitive information for nearly a year, the FBI warned last week.
 
Dan Geer Explains the Government Surveillance Mentality  11 November 2013 
Source: Schneier on Security - Posted by Anthony Pell   
This talk by Dan Geer explains the NSA mindset of "collect everything": I previously worked for a data protection company. Our product was, and I believe still is, the most thorough on the market. By "thorough" I mean the dictionary definition, "careful about doing something in an accurate and exact way." To this end, installing our product instrumented every system call on the target machine.
 
<< Start < Prev 1 2 3 Next > End >>

Results 11 - 20 of 1393
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.