Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: February 27th, 2015
Linux Security Week: February 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Government Wants Internet Emergency Preparedness  10 August 2000 
Source: ComputerUser - Posted by Jen Olson   
Attempting to expand a system that allows disaster-relief agencies to place prioritized phone calls in times of emergency, a US government agency earlier this month asked engineers to build similar capabilities into the technology that runs the Internet. At an Aug. . . .
Hack Attacks On Pentagon Sites Persist  10 August 2000 
Source: ComputerUser - Posted by Jen Olson   
Despite crying "uncle" and appealing to hackers to leave their locales alone, US Defense Department officials said that mischief-making cyber vandals continue to target Pentagon Web sites. The ongoing acts, or "events," as described in a Reuters report, include probes, scans, . . .
E-Commerce Sting Nabs Satellite TV Pirates  09 August 2000 
Source: E-CommerceTimes - Posted by Dave Wreski   
Hundreds of would-be satellite TV thieves who logged onto the Web to buy counterfeit satellite access cards instead bought themselves a whole lot of trouble, because the site was operated by the U.S. Customs Service as part of a sting operation.. . .
Attorney General Accused of Treason  09 August 2000 
Source: - Posted by Chris Pallack   
US Representative James Traficant accused Attorney General Janet Reno of treason, sexual improprieties and ties to the mob Monday night on a Fox television news show. Supporters of Traficant say that the Congressman has been targeted by the Clinton White House . . .
E-Sign rules open for comment  09 August 2000 
Source: FCW - Posted by Benjamin D. Thomas   
The Office of Management and Budget is looking for comments on draft guidance that will help agencies understand and use the new electronic signature legislation passed by Congress in June. . . .
FBI And FBI Director Sued For Harassment  08 August 2000 
Source: - Posted by Chris Pallack   
fThe former Director of the Office of Intelligence for the U.S. Department of Energy and Chief of Counter Intelligence from 1994 to 1998, Notra Trulock, is sueing FBI director Louis Freeh and the Federal Bureau of Investigation for harassment. Mr. Trulock . . .
Who's Afraid of Carnivore? Not Me!  08 August 2000 
Source: - Posted by Dave Wreski   
Recently, the FBI has become embroiled into the controversy surrounding its latest attempt to bring law enforcement into the Information Age. The "Carnivore'" project is the Bureau's attempt to collect information on electronic suspects and computer criminals in the dark reaches . . .
Hackers linked to China stole Los Alamos documents  05 August 2000 
Source: Lexis-Nexis - Posted by Chris Parker   
Computer hackers suspected of working for a Chinese research institute in Beijing stole large amounts of sensitive, but unclassified data, from the Los Alamos National Laboratory in New Mexico, The Washington Times reported.
IMC's Arresting Coverage  05 August 2000 
Source: TheStandard - Posted by Chris Parker   
By the third day of the Republican National Convention, the desultory crews manning the much hyped Internet Alley are as bored and shiftless as the rest of the thousands of reporters swarming over the convention site in an attempt to report . . .
White House dives into cybercrime debate  03 August 2000 
Source: GovExec - Posted by Dave Wreski   
The Clinton administration formally waded into the cybercrime debate this week by forwarding a proposal to Capitol Hill that calls for enhancing law enforcement's ability to conduct wiretaps while creating new privacy protections. Justice Department officials sent what they call the . . .
<< Start < Prev 139 140 141 Next > End >>

Results 1381 - 1390 of 1428


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
DDoS Exploit Targets Open Source Rejetto HFS
Gemalto Confirms It Was Hacked But Insists the NSA Didnít Get Its Crypto Keys
Hackers exploit router flaws in unusual pharming attack
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.