Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 30th, 2015
Linux Advisory Watch: March 27th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Security limits Linux in government  02 August 2000 
Source: FCW - Posted by Jen Olson   
The biggest threat to Linux becoming the software of choice in government circles is that there is no third-party verification, certification or evaluation of it, Linux devotees were told last month. The operating system also fails to meet Common Criteria . . .
Europe to get tough on cybercrime  01 August 2000 
Source: TheRegister - Posted by Chris Parker   
European politicians are to get tough on cyber villains by introducing new laws to combat kiddie porn, fraud, drug dealing and online terrorism.
Join Us, Don't Fight Us, Pentagon Tells Hackers  01 August 2000 
Source: FoxNews - Posted by Dave Wreski   
The largest-ever convention of computer hackers opened here on Friday with top-ranking U.S. military officials offering to hire the elite of the cybervandal world and put them to work defending against foreign government attacks. "I invite you to join the government, . . .
Fighting online leaks  31 July 2000 
Source: - Posted by Chris Pallack   
When a classified CIA overview of the U.S. intelligence community appeared on the Internet this month, it raised serious questions in national security circles about how the Digital Age has popped the top off classified information.
Cybercops Need Better Tools  31 July 2000 
Source: - Posted by Chris Parker   
Computer crimes are escalating at a rate consistent with the growth of the Internet, says Dominique Brezinski, technical guru at In-Q-Tel, a nonprofit technology incubator formed by the CIA.
Pentagon scrutinizes handheld security  31 July 2000 
Source: Federal Computer Week - Posted by Dave Wreski   
The Defense Department is conducting a top-down review of security concerning the use of personal electronic devices, including palmtop computers, certain pagers, cell phones and laptop computers. The review is part of a larger DOD effort to institute tougher security measures . . .
Join the Navy, hack the world  30 July 2000 
Source: The Register - Posted by Chris Parker   
This year's 'Meet the Fed' session at Defcon in Las Vegas became something of a government recruiting opportunity as US Assistant Defence Secretary for Command, Control, Communications and Intelligence Arthur Money appealed to an audience composed largely of ubergeeks, h4x0rz and . . .
U.S. Wants More Cybercrime Laws  27 July 2000 
Source: Wired - Posted by Chris Parker   
More than 100 countries do not have the laws to deal with computer-related crime, undercutting efforts to battle a growing international threat, law enforcement officials said on Wednesday.
Carnivore and Open Source Software  25 July 2000 
Source: - Posted by Dave Wreski   
Matt Blaze talks about the FBIs Carnivore system. "The "Carnivore" system runs on an FBI-owned PC that can be installed at an ISP to collect IP traffic as part of a court-ordered wiretap. Not much detail is publicly known about exactly . . .
Secret CIA Papers Posted On Web Site  25 July 2000 
Source: ComputerUser - Posted by Jen Olson   
A New York-based Web site has reportedly published a secret overview of the US intelligence community prepared by the CIA in 1998 for visiting for Japanese intelligence officials. An Associated Press report said the briefing contained information on the CIA's budgets . . .
<< Start < Prev 139 140 141 Next > End >>

Results 1401 - 1410 of 1434


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Feds Charged With Stealing Money During Silk Road Investigation
EFF questions US government's software flaw disclosure policy
Hotel Router Vulnerability A Reminder Of Untrusted WiFi Risks
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.