Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Feds certify lab to test security apps  18 August 2000 
Source: - Posted by Chris Pallack   
The government has certified CygnaCom Solutions Inc.'s Security Evaluation Laboratory to test information security software to assure users that security products perform the functions that vendors claim.
Code is not free speech  18 August 2000 
Source: Infoworld - Posted by Pete O'Hara   
IN WHAT SOME observers see as a significant ruling for the future of the Internet, a U.S. federal judge Thursday issued a permanent injunction barring an online hacker publication from linking to Web sites where visitors can download illegal code, such . . .
FCC Wiretap Order Overturned  17 August 2000 
Posted by Ryan W. Maple   
Oscar S. Cisneros writes: "Privacy groups are cheering a federal appeals court decision that promises to curb the ability of law enforcement agencies to get access to Internet-style communications. The decision also reins in the hungry maw of the government's Carnivore . . .
FBI has 3,000 documents about e-mail surveillance system  17 August 2000 
Source: sjmercury - Posted by Jen Olson   
The FBI has 3,000 pages of documents about its ``Carnivore'' e-mail surveillance system and expects to begin releasing some to the public in about 45 days, the Justice Department said Wednesday. Additional releases should follow every 45 days until all the . . .
Court rules for tougher surveillance standards  16 August 2000 
Source: - Posted by Chris Pallack   
The Federal Court of Appeals for the District of Columbia ruled yesterday that law enforcement agents seeking to intercept data packets that combine addressing information and the content of communications must meet the higher legal requirements needed for a search warrant. . . .
Online balloting thwarts hackers  16 August 2000 
Source: - Posted by Chris Pallack   
An electronic balloting service stopped 35 attempts to hack into the Reform Party's presidential nomination process in another successful step toward online voting, Inc. officials said.
FBI, Mounties hunt Internet hackers  15 August 2000 
Source: cnews - Posted by Jen Olson   
RCMP are working with the FBI to track down computer hackers who overloaded an Edmonton-based Internet service provider yesterday, denying access to some customers. Edmonton RCMP found the "denial of service" attack on OA Group Inc.'s server that barred subscribers . . .
Feds shape cyberwarning strategy  15 August 2000 
Source: FCW - Posted by Jen Olson   
Under pressure from Congress to better coordinate the government's response to computer viruses and other cyberattacks, the National Security Council has developed a plan outlining roles and responsibilities for federal cybersecurity organizations.
Wiretapping, You, and the Government.  14 August 2000 
Source: Wired News - Posted by Ryan W. Maple   
Oscar S. Cisneros writes: "A new government-approved standard for telecommunications equipment violates the Fourth Amendment's prohibition against unreasonable searches and seizures, critics say. The standard, released in updated form last week by the Telecommunication Industry Association, instructs telecommunications hardware manufacturers on . . .
Infosec education needs revamping, professor warns  14 August 2000 
Posted by Chris Pallack   
A report to be published this year by one of the nation's top educators in information systems and security warns that the current system of higher education cannot support the demand for information assurance professionals and calls for a revolutionary change . . .
<< Start < Prev 136 137 138 Next > End >>

Results 1371 - 1380 of 1432


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
FBI Quietly Removes Recommendation To Encrypt Your Phone
And the prize for LEAST SECURE BROWSER goes to ... Chrome!
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.