Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: November 28th, 2014
Linux Advisory Watch: November 21st, 2014
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

The Pros and Cons of Posting Vulnerabilities  26 October 2000 
Source: Network Magazine - Posted by Dave Wreski   
Once upon a time, only the black hats (often called hackers) and a few self-described white hats (often called security experts) had easy access to security vulnerability information. The black hats could use their knowledge to break into computers at will. . . .
Shining light on cybercrime  24 October 2000 
Posted by Dave Wreski   
After more than six years of chronicling the insecurities of cyberspace for a computer security newsletter, Richard Power finally decided this past spring to put it all together in a book. The result is Tangled Web: Tales of Digital Crime From . . .
Cyber-exploitation: Making money on kids  23 October 2000 
Source: SunWorld - Posted by Chris Pallack   
Is the teenage hacker really someone to fear? In this week's Unix Security, Carole Fennelly investigates who's benefiting from the hacker hype. Just this week, I was spammed with a press release from ComputerCop, entitled "Famed NYPD Detective Urges Parents . . .
Princeton Team Cracks SDMI  23 October 2000 
Source: LinuxToday - Posted by Dave Wreski   
SDMI is the music industry forum trying to build a system for protecting digital music against being illegal copying. The outfit launched the Hack SDMI challenge last month to invite the public to attack its digital watermark technology and possibly win . . .
Proud to Represent Hackers  19 October 2000 
Source: Wired - Posted by Jen Olson   
As a European intellectual distrustful of U.S. influence, Mueller-Maguhn can be counted on to make a splash when the ICANN board meets in California next month. Among his first priorities will be explaining to an American audience just what the term . . .
Cybercrime threat 'real and growing'  19 October 2000 
Source: BBC News - Posted by Chris Pallack   
Michael Vatis, director of the USA's National Infrastructure Protection Center (NIPC), said the threat of crime using the internet was real and growing. Speaking at the World E-Commerce Forum in London, he described an "array of threats" to e-commerce and society . . .
Inside the world of a 'hactivist'  18 October 2000 
Source: CNN - Posted by Chris Pallack   
Yetzer's a hacker and an acknowledged "social engineer" with curious nocturnal habits. There are thousands of people like him, who by day are system and network administrators, security analysts and start-up co-founders. When night comes, they transform into vampire wanna-bes, hedonists, . . .
Hacktivist edits on-line newspaper  11 October 2000 
Source: The Register - Posted by Jen Olson   
A hacktivist going by the alias 'Exiled Dave' broke into on-line newspaper the Orange County Register last week and edited several stories, one of which said that Microsoft founder Bill Gates had been arrested for hacking into "hundreds, maybe thousands" of . . .
Issues: The medias guide to talking to hackers  04 October 2000 
Source: - Posted by Benjamin D. Thomas   
Two years ago, the then just started HNN, published an article in their Buffer Overflow section called "A hackers guide to talking to the media". It was received with different opinions around the scene (I remember it referred to as "a . . .
Computer security expert gives advice on protection from hackers  03 October 2000 
Source: StarTribune - Posted by Dave Wreski   
The driving force for hackers usually isn't malice, but rather curiosity. Most hackers are young males, and some are harmless. It's the so-called "crackers" who are more malicious. However, a distinction between the two usually isn't made except in hacker culture.. . .
<< Start < Prev 208 209 210 Next > End >>

Results 2081 - 2090 of 2186


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.