Top White Papers
Linux Top 3: Red Hat Misfires Piston, SUSE Cloud 3 and GNOME 3.12 is Coming
Linux Today - Security
Can Cloud Services be Exploited to Aid Attackers?
(Mar 07, 2014, 05:00) (0 talkbacks)
eSecurityPlanet: Ragan said that he was in fact able to build a botnet using free trials from multiple cloud vendors, without spending a penny.
GnuTLS: Big internal bugs, few real-world problems
(Mar 06, 2014, 15:00) (0 talkbacks)
ZDNet: To sum up, no one should be using GnuTLS.
Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping
(Mar 06, 2014, 04:00) (3 talkbacks)
ars: Hundreds of open source packages, including the Red Hat, Ubuntu, and Debian distributions of Linux, are susceptible to attacks.
SOHO Routers at Risk--Again
(Mar 05, 2014, 04:00) (0 talkbacks)
eWEEK: A report claims 300,000 consumer routers are at risk. Where have we heard this story before?
RSA: Privacy, Secrecy Are Not Synonymous
(Mar 02, 2014, 06:00) (0 talkbacks)
eSecurityPlanet: "Privacy is not synonymous with secrecy," she said.
No, Google's Sundar Pichai Didn't Say Android's Openness Makes It Less Secure
(Feb 28, 2014, 12:00) (0 talkbacks)
TechCrunch: This morning at Mobile World Congress, Google's Sundar Pichai discussed Android's security and the impact of its 'openness' thereof.
RSA: Bruce Schneier Discusses What Should be Done With the NSA -
(Feb 26, 2014, 23:00) (0 talkbacks)
eWEEK: Bruce Schneier is a legendary figure in the security community, well-known for his expertise in cryptography and more recently for his insight into the surveillance activities of the National Security Agency (NSA).
Cisco details Sourcefire security threat integration, open source direction
(Feb 25, 2014, 14:00) (0 talkbacks)
Network World: At RSA , Cisco invites open-source community through "Open App ID" to build application-layer next-generation firewall code.
Adobe Updates for Zero-Day Risk, Handles Emergency
(Feb 21, 2014, 19:00) (0 talkbacks)
eWEEK: Adobe issued an unscheduled zero-day update for a security issue on Feb. 20 for its Flash Player 188.8.131.52 and earlier versions for Windows and Macintosh, and Adobe Flash Player 184.108.40.2066 and earlier versions for Linux.
AlienVault Advances Open-Source SIEM
(Feb 20, 2014, 23:00) (0 talkbacks)
eWEEK: SIEM technology plays a pivotal role in the modern security landscape, enabling organizations to log and monitor security events.
Belkin Says It Fixed WeMo Flaws Noted in IOActive Security Advisory (Linux Powered)
(Feb 19, 2014, 19:00) (0 talkbacks)
eWEEK: Belkin claims that it has already fixed the security vulnerabilities in its connected home WeMo devices reported in a public advisory issued by IOActive on Feb. 18.
How to spoof the MAC address of a network interface on Linux
(Feb 19, 2014, 09:00) (0 talkbacks)
xmodulo: While a MAC address is a manufacturer-assigned hardware address, it can actually be modified by a user.
Linux Top 3: Shuttleworth Leaves Upstart, Arch Assaults Security and Android x86 4.4
(Feb 17, 2014, 23:00) (0 talkbacks)
LinuxPlanet: A new Arch based security distribution is now surfacing, for penetration testers.
RSA Conference Preview: Government Surveillance, SDN Among Key Topics
(Feb 17, 2014, 02:00) (0 talkbacks)
eWEEK: Analysts said hot topics at the upcoming RSA Conference will include government surveillance and the NSA flap, SDN security and skills shortages.
Yubico Extends Two-Factor Authentication to CERN
(Feb 14, 2014, 05:00) (0 talkbacks)
eWEEK: Yubico's YubiKey combines open-source software with proprietary hardware to deliver a customized approach to two-factor authentication. -
Massive DDoS Attack Leveraged Network Timing Protocol -
(Feb 12, 2014, 05:00) (0 talkbacks)
eWEEK: One of the largest distributed denial-of-service attacks (DDoS) ever seen hit the Internet Feb. 11
The People Vs the NSA
(Feb 11, 2014, 05:00) (0 talkbacks)
FOSS Force: If you own a computer of any type that connects to the Internet, you too have to assume the NSA is collecting your data–watching you.
PGP Web of Trust: Core Concepts Behind Trusted Communication
(Feb 09, 2014, 22:00) (0 talkbacks)
Linux.com: Public Key Cryptography infrastructure (PKI) has two main implementations.