Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: January 27th, 2015
Linux Advisory Watch: January 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Using Credit Cards Online, Are you Safe?  17 August 2001 
Source: - Posted by Pete O'Hara   
Every year millions of dollars are lost to credit card fraud. Just who is supposed to be held responsible for all this stuff? The online shopping sites, the end user or your over friendly neighbour? In this article, I shall talk about the detailed anatomy of a credit card, the loop holes of some of the online shopping sites and a few other details.. . .
Hacker sneaks into Visa credit-card site; might have compromised data  17 August 2001 
Source: Lexis-Nexis - Posted by Derrick Lewis   
A computer hacker is lurking in cyberspace, targeting Visa credit- and debit-card holders. Until Wednesday, Richard Sieberg had owned a Visa card for three years without any security problems. 'Gardiner Savings Institution called me and said that my Visa had been . . .
CyberCrime Help  17 August 2001 
Source: Tech TV - Posted by Derrick Lewis   
Cyberspace can be an exciting place these days. But, unfortunately, it can also be a dangerous place, especially if you're unaware of the dangers and how to protect yourself. So we at "CyberCrime" thought we'd offer some tips and ideas for staying safe online.. . .
PDAs increasingly vulnerable to hackers  16 August 2001 
Source: - Posted by Dave Wreski   
Handheld computers are increasingly vulnerable to hacker attacks and should not be trusted to store "any critical or confidential information," security experts warned Thursday. Peiter Zatko, chief scientist and a vice president of @Stake, a Cambridge, Mass.-based security-engineering firm, and Joe . . .
50 hackers to take part in server-cracking contest  16 August 2001 
Source: The Nation - Posted by Jen Olson   
Hackers will be challenged to penetrate a variety of computer networks early next month with no threat of punishment if they are successful, a network security firm said yesterday. Parinya Homanek, managing director of Net En Tel Co Ltd, said the . . .
Socking It To Microsoft, One Last Time  15 August 2001 
Source: Newsbytes - Posted by Dave Wreski   
In a final effort to sway Microsoft, a security researcher has released a new tool that he says proves Windows XP is unsafe. Steve Gibson, president of Gibson Research Corporation, today posted on his Web site a free utility called SocketToMe. . . .
Hackers hit Los Alamos public information site  14 August 2001 
Source: NW Fusion - Posted by Pete O'Hara   
Hackers trying to beat government security on the public information Web site of the Los Alamos National Laboratory instead succeeded primarily in denying chemistry students access to a free posting of the periodic table. A hacking group that calls itself Poisonbox . . .
Net security experts carve up Code Red II worm over dinner  07 August 2001 
Source: Silicon Valley - Posted by Jen Olson   
A group of high-powered Internet security experts took their laptops to dinner on Saturday and between courses began analyzing the virulent new worm that now threatens the Web, the researcher who hosted the gathering said Monday. Analysts from Microsoft, Symantec, Computer . . .
Brian Martin speaks about Attrition defacement  01 August 2001 
Source: infoguerra - Posted by Dave Wreski, a Web site that leaped into world fame for its mirror defacement section, went through a couple of eventful moments this year. The first occasion was one of its own making, with the decision to discontinue the presentation of mirrors, . . .
Legal Battle Brewing Over Release of Telnet Exploit?  30 July 2001 
Source: Internetnews [LinuxToday] - Posted by Dave Wreski   
On Tuesday, the Computer Emergency Response Team (CERT) issued an advisory that servers running the Berkeley Software Design (BSD) operating system were vulnerable to the flaw. But less attention has been paid to a possible legal battle brewing behind the scenes between TESO and a prominent security mailing list owned by security firm . . .
<< Start < Prev 187 188 189 Next > End >>

Results 1861 - 1870 of 2207


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
No, Lizard Squad Was Not Responsible For Facebook Outage
Why Network Segmentation is Imperative on the Internet of Things
GHOST glibc Remote Code Execution Vulnerability Affects All Linux Systems
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.