Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: January 23rd, 2015
Linux Advisory Watch: January 16th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Tech Groups Still Wary Of International Cyber-Crime Treaty  04 December 2000 
Source: Computer User - Posted by Dave Wreski   
A coalition of high-tech companies voiced concern over the Council of Europe's latest revisions to its international cyber-crime treaty, saying the modified language still imposes burdensome data preservation requirements on Internet service providers, and could potentially restrict legal activities online.. . .
Agency adds smart cards, PKI  01 December 2000 
Source: Federal Computer Week - Posted by Chris Pallack   
The Bureau of Labor Statistics is bolstering systems security by adding public-key infrastructure and providing smart cards to 1,500 employees. BLS will issue most of the cards to field workers who sign in to the agency's network remotely. Currently, remote users . . .
FBI steps up efforts to fight crimes related to computers  28 November 2000 
Source: Lexis-Nexus - Posted by Benjamin D. Thomas   
The FBI has opened its first multiagency, multijurisdictional office aimed at combating the escalation of computer-related crimes and has assigned it the task of acquiring, archiving and analyzing digital evidence in support of criminal investigations. The new facility, located in San . . .
Study To Identify Limits Of FBI's E-Mail Surveillance Tool  27 November 2000 
Source: Computer User - Posted by Dave Wreski   
Most of the concerns raised about the FBI's controversial e-mail surveillance tool have been overblown, according to a key member of an independent review team charged with evaluating the system, also known as "Carnivore." Still, the reviewer said, a study soon . . .
U.S. Army kick-starts cyberwar machine  25 November 2000 
Source: CNN - Posted by Benjamin D. Thomas   
The U.S. military has a new mission: Be ready to launch a cyberattack against potential adversaries, some of whom are stockpiling cyberweapons. Such an attack would likely involve launching massive distributed denial-of-service assaults, unleashing crippling computer viruses or Trojans, and . . .
FBI 'Carnivore' report sides with government  23 November 2000 
Source: CNN - Posted by Benjamin D. Thomas   
The FBI's controversial e-mail surveillance tool works about the way the bureau says and generally doesn't "overcollect" evidence, an independent reviewer of the system said. But his remarks failed to calm the fears of privacy advocates. Henry H. Perritt said . . .
Is there hope? Electronic Voting  22 November 2000 
Source: SunWorld - Posted by Pete O'Hara   
What is the feasibility of running national federal elections over the Internet? SunWorld guest writer Avi Rubin focuses on the limitations of the currently deployed infrastructure, with an emphasis on concerns over the security of voting hosts and the Internet itself. . . .
Washington boasts digital trust  21 November 2000 
Source: FCW - Posted by Dave Wreski   
Washington state agencies doing business electronically with the private sector can now be assured companies and individuals are who they say they are. By December, the state's new security architecture and transaction gateway -- called Transact Washington -- will accept digital . . .
FBI aids local businesses with computer security  17 November 2000 
Source: KnoxNews - Posted by Jen Olson   
Over the past year, FBI agent Steve McFall has investigated less than a dozen local cases of computer hacking. He suspects many more instances of corporate hacking occur in East Tennessee, however, but businesses either don't realize they can call the . . .
Better methods of voting debated  15 November 2000 
Source: Bergen - Posted by Benjamin D. Thomas   
Computers may not be the ultimate voting tools, despite their utility for other tasks, say experts in computer security and voting. "All voting systems, including the new ones being proposed -- the Internet and direct entry balloting, they all have flaws," . . .
<< Start < Prev 130 131 132 Next > End >>

Results 1301 - 1310 of 1420


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
Barrett Brown Sentenced to 5 Years in Prison in Connection to Stratfor Hack
Thousands of U.S. gas stations exposed to Internet attacks
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.