Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 23rd, 2015
Linux Advisory Watch: March 20th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Cybercrime soars in the UK  07 November 2000 
Source: VNUNet - Posted by Dave Wreski   
Cybercrime accounted for half of all fraud committed in the UK in the first six months of this year, according to a legal expert. Steven Philippsohn, senior litigation partner at law firm Philippsohn, Crawfords, Berwald, said this figure would rise as . . .
Combating Internet crimes and threats  07 November 2000 
Source: Upside - Posted by Jen Olson   
With cybercrime on the rise, even more attention is being paid to using the law to fight the cybercrooks. Only days ago, it was reported that the blueprints to the latest versions of Microsoft's (MSFT) Windows and Office software package were . . .
Consultants claim businesses need to be concerned about hacktivism  06 November 2000 
Source: PC World - Posted by Benjamin D. Thomas   
Computer hackers with political agendas have become a fast-growing threat to big companies worldwide, according to a corporate intelligence company. "The methods they are using are in their infancy," says Kent Anderson of Control Risks Group, an international business risk consultancy. . . .
'Hactivist' threats on the rise  03 November 2000 
Source: ZDNet - Posted by Jen Olson   
Computer hackers with political agendas have become a fast-growing threat to big companies worldwide, a corporate intelligence company said on Thursday. "The methods they are using are in their infancy," said Kent Anderson of Control Risks Group, an international business risk . . .
Cyber Crime Corp. Unveils E-Snitch  02 November 2000 
Source: - Posted by Dave Wreski   
High-tech thieves and industrial spies seem like the makings for the next John Grisham novel, but the folks over at the Cyber Group Network Corp. take cyber theft very seriously. The company's subsidiary, Cyber Crime Corp., today unveiled its revolutionary E-Snitch . . .
SafeVote Invites Hackers To Give It A Crack  01 November 2000 
Source: NewsBytes - Posted by Dave Wreski   
As a growing interest in online voting emerges and companies like have completed several mostly-successful medium-scale elections online, an Internet voting service is inviting hackers from around the world to test its particular system's defenses.. . .
How you hack into Microsoft: a step by step guide  31 October 2000 
Source: The Register - Posted by Dave Wreski   
Network security becomes increasingly difficult as point-and-drool cracking tools proliferate. So many painfully easy-to-use appz have been developed in recent years that persistence is now a far more reliable predictor of success than skill: even a newbie cracker can succeed by . . .
Know Thine Enemy  30 October 2000 
Source: CRN - Posted by Jen Olson   
Kevin Mitnick used to make life miserable for corporate IT managers by breaking into computer systems. Now he's making it his business to help them secure their networks against hackers. Last month Mitnick, who was released from prison earlier this year . . .
New technologies create fresh inroads for hackers  30 October 2000 
Source: - Posted by Jen Olson   
The attack on Microsoft underscores that corporate networks are still widely vulnerable to hackers, security analysts say. Even as companies shore up security in some areas, new technologies--such as Web-based email and broadband DSL and cable Internet connections--create new vulnerabilities.. . .
The week in review: Hacking Microsoft  28 October 2000 
Source: - Posted by Chris Pallack   
Calling it an act of "industrial espionage," Microsoft said malicious hackers gained access to its internal networks, where they were able to see some of the company's upcoming software code.
<< Start < Prev 211 212 213 Next > End >>

Results 2111 - 2120 of 2230


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Tech Companies, Privacy Advocates Call for NSA Reform
Google warns of unauthorized TLS certificates trusted by almost all OSes
How Kevin Mitnick hacked the audience at CeBIT 2015
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.