Feature Articles - Page 3
Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
A memoir written by Dave Wreski, Guardian Digital CEO, Founder of LinuxSecurity.com and author of the Linux Security Quick Reference Guide and Linux Security HOWTO.
If you use Linux, whether it is just to browse the web, use it as a VPN server, or even if you use it to hack people (Just kidding!), then it is pretty essential and worthwhile to understand the pros and cons of using a VPN for Linux.
The use of Web Applications is growing amongst businesses, however, that also makes these businesses a target for Cyber Criminals to attack. If there are vulnerabilities within your Web Application, then that means there is a flaw that attackers may exploit to really wreak some havoc to an individual, small business, or even large corporations alike.
In this increasingly digital era, every business, no matter the size, has to be vigilant about its cybersecurity. Data breaches have become rampant over the past several years, costing even the top companies millions of dollars in damages. Hackers are always scheming to steal critical data and so, it is best to stay ahead of the game.
Virtual Private Networks (VPNs) were initially created to grant workers who are remote, workers who travel, or workers who do not tend to be in the office access to the local network over an insecure network connection when they are not physically within the local network. Essentially, a VPN can be used for various reasons however, the main purpose was for the use of businesses and companies.
Thank you to Lerma for contributing this article. What is the impact of AI on cybersecurity today? AI is making a difference for companies feeling the pinch of strained resources. The resilience of tech-savvy cyber hackers is another reason cybersecurity strategists are quickly adopting artificial intelligence-powered solutions.
Nowadays, Linux systems are considered fairly secure, as people think that Linux rarely gets infected with malware such as viruses, rootkits, worms, etc. You might also see that we hardly ever come across Antivirus software being sold for Linux, giving the illusion that Linux is an ultimately secure Operating System.
End-to-end encryption is an increasingly popular method that online services are using to ensure their users’ security. End-to-end encryption, also known as E2EE, encodes messages sent from one user to another in a way that ensures that only the sender and recipient can decode the message.
In the previous part of our Hacker's Corner series, we covered anti-debugging using a trivial self-modifying code. Here, instead of blocking debugging completely, we will detect various debugger-induced activities.
In our previous Hacker's Corner article, we covered some simple anti-debugging. Here, we will see some better techniques.
While the internet provides many benefits, it also brings new risks and challenges. One of the most common and notable of these is the threat to our privacy. Some users might think that they are protected by their browser, search engine and antivirus programs. However, the truth is that most of us aren’t doing nearly enough to keep websites from tracking us.
Today, one of the most popular ways for free websites and browsers to make a profit is tracking and selling user data to advertisers. While most tracking is behind the scenes and discreet, allowing oneself to be tracked can have negative consequences–attackers often attempt to track users the same way legitimate companies do in order to steal data; not to mention the growing concern of companies using data purchased from legitimate sources to manipulate users.
Globally, there are roughly 30,000 web-based cyberattacks daily, primarily targeting smaller businesses and smaller websites. To put it into perspective, that is an estimated 1 cyberattack every 3 seconds that targets websites specifically.
Thank you to Anastasios Arampatzis for contributing this article. With web and API security becoming an increasingly important aspect of software development, “shift left” is gaining wide acceptance as a best practice to ensure security integrates with development early. More and more cybersecurity companies are releasing relevant products and capabilities, and the practice is becoming almost de facto for engineering teams.
Technology is developing and advancing tremendously. New inventions are delivered to the market every year and all of these improve the entire domain a lot. But because there are so many options and opportunities on the market, you might end up feeling more confused than at the beginning.
With email-related attacks becoming increasingly prevalent and serious, securing your business email accounts is more important than ever before.
Learn about the growing importance of scanning Linux systems for malware, and our favorite tools for doing so.
As open-source software becomes increasingly common in the infrastructure of businesses, it is essential to ensure the security of the software being relied upon. An increasingly popular cyber security solution is open-source SAST (Static Application Security Testing) and DAST (Dynamic Analysis Security Testing) security scanning, which give IT technicians and developers the ability to access the code of a certain piece of software to remove threats or improve the strength of its security.
This article will explore the key benefits and potential drawbacks of open source security in under a minute.