Top White Papers
Linux Turns 23
Linux Founder Linus Torvalds 'Still Wants the Desktop'
Linux Today - Security
How to secure a LAMP server on CentOS or RHEL
(Aug 27, 2014, 14:00) (0 talkbacks)
xmodulo: In this article we will assume that each component of the stack is already up and running, and will focus exclusively on securing the LAMP server(s).
Mozilla Adding Granular App Permissions to Firefox OS
(Aug 26, 2014, 14:00) (0 talkbacks)
ThreatPost: Mozilla is set to add a feature to its mobile Firefox OS that will give users the ability to revoke any application’s permissions on a granular basis.
Security Hardening with Ansible
(Aug 25, 2014, 05:00) (0 talkbacks)
Linux Journal: Ansible is an indispensable tool in implementing and maintaining a strong security posture.
Android Security Is Under Fire--Again
(Aug 24, 2014, 06:00) (0 talkbacks)
eWEEK: A pair of new reports take aim at Android security, but there are steps users can take and the sky isn't falling. - See more at: http://www.eweek.com/security/android-security-is-under-fire-again.html#sthash.2QuqGtVt.dpuf
Itus Networks Taps Kickstarter for Home Gateway Security
(Aug 20, 2014, 10:00) (0 talkbacks)
eWEEK: While Internet connectivity in the home is now mainstream, gateway security to protect users is not.
Linux Kernel Development Gets Two-Factor Authentication
(Aug 20, 2014, 08:00) (0 talkbacks)
eWEEK: Linux kernel development is getting a new layer of security with the introduction of two-factor authentication for code commits.
How to configure Access Control Lists (ACLs) on Linux
(Aug 19, 2014, 13:00) (0 talkbacks)
xmodulo: Working with permissions on Linux is rather a simple task.
When the Police Can Brick Your Phone
(Aug 17, 2014, 18:00) (1 talkbacks)
FOSSforce: If the owner can disable a phone with nothing but access to a computer or another mobile device, so can Google, Samsung, Microsoft, Nokia or Apple.
How to Encrypt Email in Linux
(Aug 15, 2014, 19:00) (0 talkbacks)
Linux.com: If you've been thinking of encrypting your email, it is a rather bewildering maze to sort through thanks to the multitude of email services and mail clients.
How to Detect SSL Leakage in Mobile Apps
(Aug 13, 2014, 10:00) (0 talkbacks)
eSecurityPlanet: According to security researchers Tony Trummer and Tushar Dalvi, many popular mobile apps do not properly implement SSL.
Black Hat, Defcon Conferences: From Hackers to Pwnie Awards
(Aug 13, 2014, 09:00) (0 talkbacks)
eWEEK: No week is busier in the calendar year for information security professionals than the week of the Black Hat and Defcon security conferences.
Linux Security Threats on the Rise
(Aug 12, 2014, 10:00) (0 talkbacks)
LinuxJournal: One of the many benefits cited by enterprises bringing in Linux is the security and the resultant "cost of ownership" benefits that come from, among many other things, not having to deal with security-related issues and attacks.
Pineapple Hacking Device Resembles a Carbon Monoxide Detector
(Aug 12, 2014, 04:00) (0 talkbacks)
eWEEK: A Linux powered WiFi hacking device that could be hidden in what appears to be a standard carbon monoxide detector casing was demoed at Defcon.
EMV Is No Silver Bullet for Payment Card Security
(Aug 10, 2014, 10:00) (1 talkbacks)
eWEEK: EMV isn't the savior of the payment card industry; it's just another set of problems, two security researchers demonstrated at Black Hat.
Icinga: A Next Generation Open Source Linux Server Monitoring??? Tool for RHEL/CentOS 7.0
(Aug 10, 2014, 04:00) (0 talkbacks)
tecmint: This topic will concentrate on a basic installation of Icinga 1 Monitoring Tool from binaries on CentOS or RHEL 7
Yahoo CISO Details Challenge of Security at Scale
(Aug 08, 2014, 19:00) (0 talkbacks)
eSecurityPlanet: "We have failed to make the Internet safe because we haven't thought enough about scale," Stamos said.
New Flaw Puts Millions of WordPress, Drupal Sites at Risk
(Aug 07, 2014, 15:00) (0 talkbacks)
eWEEK: A new vulnerability is affecting the two most widely used open-source content management systems.
Nest Thermostat Security Risk Disclosed at Black Hat
(Aug 06, 2014, 13:00) (0 talkbacks)
eWEEK: According to Jin, the backdoor his team found can bypass verification and enable an attacker to install a customized kernel that could run arbitrary code.
Buy All the Cybersecurity Vulnerabilities: Black Hat Keynote
(Aug 06, 2014, 12:00) (0 talkbacks)
eSecurityPlanet: Also suggests that Windows XP be made open-source.
Can We Stop Playing Card Games with Business?
(Aug 06, 2014, 09:00) (0 talkbacks)
LinuxJournal: I don't know if any of the new ideas for solving this kind of mess are going to succeed.
Mobile Phones at Risk From Carrier Backdoor Flaw: Black Hat
(Aug 05, 2014, 09:00) (0 talkbacks)
eWEEK: Software used by carriers to help set up phones is found to have security vulnerabilities.
Eight Steps to Eliminating Security Risks in WordPress
(Aug 04, 2014, 14:00) (1 talkbacks)
eWEEK: Here are guidelines to help users limit security risks in WordPress.
RHEL 7 / CentOS 7 : Disable Firewalld and use iptables
(Aug 03, 2014, 06:00) (0 talkbacks)
All Linux Users: Just installed CentOS 7 on my Virtual machine and realized that, Firewalld is bit complicated as I am using iptables firewall
Securing SSH with two factor authentication using Google Authenticator
(Aug 01, 2014, 10:00) (0 talkbacks)
Blackmoreops: Two-step verification (also known as Two-factor authentication, abbreviated to TFA) is a process involving two stages to verify the identity of an entity trying to access services in a computer or in a network.
Fedora Security Team
(Aug 01, 2014, 09:00) (0 talkbacks)
The Security Team's mission is to assist packagers in closing security vulnerabilities.
How to Create Self-Signed SSL Certificates and Keys for Apache on RHEL/CentOS 7.0
(Aug 01, 2014, 07:00) (0 talkbacks)
tecmint: SSL (Secure Sockets Layer) is a cryptographic protocol that allows secure data flow between a server and its clients using symmetric/asymmetric keys by using a digital certificate signed by a Certificate Authority (CA).
Who Funds Tor Project May Surprise You, or Maybe Not
(Jul 31, 2014, 10:00) (0 talkbacks)
eWEEK: The U.S government is helping foot the bill for the Tor Project, even as new attacks against the anonymous network platform are disclosed.
Heartbleed Flaw Is Still a Risk, Report Finds
(Jul 30, 2014, 23:00) (0 talkbacks)
eWEEK: A Venafi report claims that only 3 percent of big companies have fully patched for Heartbleed.
Mine Bitcoins with Raspberry Pi
(Jul 29, 2014, 14:00) (0 talkbacks)
LinuxUser: Jump on the cryptocurrency bandwagon and mine some of your own Bitcoins – or other currency – with a spare Raspberry Pi
Fake ID Flaw Puts Android Users at Risk
(Jul 29, 2014, 09:00) (0 talkbacks)
eWEEK: Bluebox Security reveals fundamental flaws in how Android validates the identity of app developers. Full details will be given at the upcoming Black Hat event.
Mozilla Firefox 32 Beta 1 Is Out, Lets Users See Login Metadata in Password Manager
(Jul 28, 2014, 13:00) (0 talkbacks)
softpedia: Mozilla doesn't waste any time when it comes to the development of the Firefox browser.