Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: February 27th, 2015
Linux Security Week: February 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Dutch judge allows alleged “sophisticated” Russian hacker to be sent to US  29 January 2015 
Source: arsTechnica - Posted by Anthony Pell   
A Dutch judge has ruled that an accused Russian “sophisticated hacker” can be extradited to the United States.
This Popular Wireless Alarm System Can Be Hacked With A Magnet And Scotch Tape  29 January 2015 
Source: Forbes - Posted by Dave Wreski   
These new-generation systems can be simple to sophisticated in their ability to detect entry into your home, and much more. Most are now integrating remote monitoring and control of home automation systems, and this was clearly evident at the recent Consumer Electronics Show in Las Vegas, where an incredible array of life-safety and comfort technology was on display.
Hackers blackmailed Silk Road underground  29 January 2015 
Source: ZDNet Blogs - Posted by Dave Wreski   
Hackers extorted thousands of dollars out of the Silk Road marketplace through threats of hitting the site with denial of service attacks or exposing severe security vulnerabilities.
'Mastermind' hacker steals 20 million credentials from dating website  28 January 2015 
Source: CSO Online - Posted by Anthony Pell   
The user names and email addresses of 20 million visitors to Russian online dating website Topface have reportedly been put up for sale on a crime forum, according to anti-fraud firm Easy Solutions.
GHOST glibc Remote Code Execution Vulnerability Affects All Linux Systems  27 January 2015 
Source: ThreatPost - Posted by Dave Wreski   
A critical vulnerability has been found in glibc, the GNU C library, that affects all Linux systems dating back to 2000. Attackers can use this flaw to execute code and remotely gain control of Linux machines.
Thousands of U.S. gas stations exposed to Internet attacks  23 January 2015 
Source: Network World - Posted by Dave Wreski   
Over 5,000 devices used by gas stations in the U.S. to monitor their fuel tank levels can be manipulated from the Internet by malicious attackers.
Wireless device in two million cars wide open to hacking  21 January 2015 
Source: arsTechnica - Posted by Anthony Pell   
An electronic dongle used to connect to the onboard diagnostic systems of more than two million cars and trucks contains few defenses against hacking, an omission that makes them vulnerable to wireless attacks that take control of a vehicle, according to published reports.
Gitrob Combs Github Repositories for Secret Company Data  15 January 2015 
Source: ThreatPost - Posted by Dave Wreski   
Free online code repositories such as GitHub provide a valuable collaboration service for enterprise developers. But it’s also a trove of potentially sensitive company and project information that’s likely to warrant attention from hackers.
Attackers planting banking Trojans in industrial systems  13 January 2015 
Source: The Register UK - Posted by Anthony Pell   
Trend Micro researcher Kyle Wilhoit says the latest attacks on SCADA and industrial control networks are turning out to carry rather pedestrian banking Trojans, and have been on the rise since October 2014.
Thieves Jackpot ATMs With ‘Black Box’ Attack  08 January 2015 
Source: Krebs on Security - Posted by Alex   
Previous stories on KrebsOnSecurity about ATM skimming attacks have focused on innovative fraud devices made to attach to the outside of compromised ATMs. Security experts are now warning about the emergence of a new class of skimming scams aimed at draining ATM cash deposits via a novel and complex attack.
<< Start < Prev 1 2 3 Next > End >>

Results 11 - 20 of 2220


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
DDoS Exploit Targets Open Source Rejetto HFS
Gemalto Confirms It Was Hacked But Insists the NSA Didn’t Get Its Crypto Keys
Hackers exploit router flaws in unusual pharming attack
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.