Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 23rd, 2015
Linux Advisory Watch: March 20th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Mass Xmas hack plan exposed  16 November 2000 
Source: - Posted by Chris Pallack   
Internet security researchers have warned that hackers are planning to launch internet-based denial of service (DoS) attacks on web retailers over the Christmas period.
Hackers' Tricks to Avoid Detection  14 November 2000 
Source: - Posted by Dave Wreski   
Hackers are not only clever in how they invade servers; they are also devious in how they disguise their attacks. Malicious attackers use a variety of evasive techniques, which we will examine in this column so that we, as . . .
Should You Strike Back?  14 November 2000 
Source: ComputerWorld - Posted by Dave Wreski   
There's a war brewing in cyberspace. Make that a Netwar, so dubbed in Countering the New Terrorism, a book published last year by The RAND Corp., a Santa Monica, Calif.-based nonprofit research group formed during World War II.. . .
Web War: When Point and Shoot Becomes Point and Click  14 November 2000 
Source: - Posted by Benjamin D. Thomas   
The online world has entered a new phase. At first it was a combination playground, library and meeting house for scientists and soldiers, an inviolate virtual world. Companies later tried to turn it into a mall. Now, it's becoming a borderless . . .
Nanoteq's hacking course - 'for the good guys'  10 November 2000 
Source: IT Web - Posted by Jen Olson   
After the huge success of presenting the course in Malaysia and recently in South Africa, the Nanoteq Training Academy is again offering its Applied Hacking Techniques course to the industry. The course has been designed to give insight into the minds . . .
Users show some sympathy to Microsoft over security  09 November 2000 
Source: CNN - Posted by Jen Olson   
Bashing Microsoft Corp. may be popular sport on some issues, but the internal security breach that the company disclosed late last month has some corporate information technology users waxing sympathetic. Several users last week said the incident -- in which a . . .
Online Music Safeguards Withstand Hackers  09 November 2000 
Source: Washington Post - Posted by Jen Olson   
A coalition of companies in the software and recording industries declared yesterday that three of five technologies aimed at stopping the online piracy of music had so far survived attack by hackers seeking to win $10,000 for cracking the security measures. . . .
The new age of hacktivism  08 November 2000 
Source: ZDNet - Posted by Jen Olson   
Politicians may not pander to them and experts may discount their opinions, but online vandals are getting the message out about what they think is important: Increasingly, that's politics. On the eve of the U.S. elections, vandals defaced the home pages . . .
After hack, Microsoft mistakes linger  08 November 2000 
Source: ZDNet - Posted by Dave Wreski   
After further review, security experts last week said enterprises can glean some new lessons from the Microsoft Corp. hacking saga. First and foremost, if you get hacked, don't do what Microsoft did. According to at least a dozen security experts contacted . . .
Microsoft plays down second hack attack  07 November 2000 
Source: - Posted by Chris Pallack   
Microsoft's internal network has been broken into for the second time in as many weeks by a hacker who exploited the fact that the software giant had not applied its own security patches.
<< Start < Prev 211 212 213 Next > End >>

Results 2101 - 2110 of 2230


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Tech Companies, Privacy Advocates Call for NSA Reform
Google warns of unauthorized TLS certificates trusted by almost all OSes
How Kevin Mitnick hacked the audience at CeBIT 2015
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.