LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: October 24th, 2014
Linux Security Week: October 20th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Government
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Hacker sentenced to 18 months for peddling computer access to US national security lab  13 December 2013 
Source: Network World - Posted by Alex   
A Pennsylvania man who hacked into multiple corporate, university and government computer networks and tried to sell access to them, including supercomputers from a U.S. national security laboratory, has been sentenced to 18 months in prison.
 
DARPA makes finding software vulnerabilities fun  09 December 2013 
Source: Network World - Posted by Anthony Pell   
The U.S. Department of Defense may have found a new way to scan millions of lines of software code for vulnerabilities, by turning the practice into a set of video games and puzzles and having volunteers do the work.
 
Our Government Has Weaponized the Internet. Here’s How They Did It  29 November 2013 
Source: Wired - Posted by Alex   
The internet backbone — the infrastructure of networks upon which internet traffic travels — went from being a passive infrastructure for communication to an active weapon for attacks.
 
FBI sends memo to US.gov sysadmins: You've been hacked... for the past YEAR  19 November 2013 
Source: The Register UK - Posted by Alex   
Hacktivists allegedly affiliated with Anonymous have been covertly breaking into US government systems and pilfering sensitive information for nearly a year, the FBI warned last week.
 
Dan Geer Explains the Government Surveillance Mentality  11 November 2013 
Source: Schneier on Security - Posted by Anthony Pell   
This talk by Dan Geer explains the NSA mindset of "collect everything": I previously worked for a data protection company. Our product was, and I believe still is, the most thorough on the market. By "thorough" I mean the dictionary definition, "careful about doing something in an accurate and exact way." To this end, installing our product instrumented every system call on the target machine.
 
12-year-old boy admits to hacking government sites for Anonymous  29 October 2013 
Source: The Verge - Posted by Dave Wreski   
A 12-year-old boy in Montreal has pleaded guilty to breaking into multiple government and police websites in the name of the hacker collective Anonymous, reports the Toronto Sun. The attacks were not politically motivated, however; the boy testified that he traded information to members of Anonymous in exchange for videogames.
 
Fallout from Snowden leaks could hinder next NSA chief  18 October 2013 
Source: Network World - Posted by Dave Wreski   
Whoever succeeds Gen. Keith Alexander as the next director of the National Security Agency will be stuck weathering the fallout from the Edward Snowden media leaks for the conceivable future.
 
NSA Harvesting Contact Lists  15 October 2013 
Source: Schneier on Security - Posted by Anthony Pell   
A new Snowden document shows that the NSA is harvesting contact lists -- e-mail address books, IM buddy lists, etc. -- from Google, Yahoo, Microsoft, Facebook, and others.
 
The NSA's New Risk Analysis  09 October 2013 
Source: Schneier on Security - Posted by Dave Wreski   
As I recently reported in the Guardian, the NSA has secret servers on the Internet that hack into other computers, codename FOXACID. These servers provide an excellent demonstration of how the NSA approaches risk management, and exposes flaws in how the agency thinks about the secrecy of its own programs.
 
Silk Road bust demonstrates feds penetration of Deepnet  08 October 2013 
Source: CSO Online - Posted by Dave Wreski   
By shutting down the notorious Silk Road criminal marketplace, federal law enforcement is succeeding at infiltrating the most sinister areas of the hidden Internet, experts say.
 
<< Start < Prev 4 5 6 Next > End >>

Results 31 - 40 of 1408
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Pro-Privacy Senator Wyden on Fighting the NSA From Inside the System
NIST to hypervisor admins: secure your systems
Quick PHP patch beats slow research reveal
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.