Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
Linux is an open-source operating system that has been popular among developers and IT professionals for its stability and security. However, over the years, Linux has faced its fair share of security threats in the form of malware. In this article, ...
While allowing public access to the sensitive behind-the-scenes operation of a program sounds risky, open-source software actually has the potential to be even more secure than a program with hidden code. However, as with any type of software, vulnerabilities still exist and can present a serious security risk if they remain unidentified and unpatched.
Peer-to-peer (P2P) torrenting users face a multitude of risks, ranging from downloading malware to inadvertently downloading unauthorized content. Your computer may get infected with viruses, your ISP may limit your connection, or you may face penalties.
As we rapidly transition to an increasingly digital society, data protection is a greater concern than ever before. Encryption is one of the most effective and widely used methods of securing sensitive information from unauthorized parties. In this article, we'll introduce you to some Linux file and disk encryption tools we love to help you safeguard critical data and protect your privacy online.
Ethical hacking might sound contradictory, but leveraging the skills of the ‘white hat’ hacker community has done a great deal for safety and security on the internet. Nowhere does this show more than through so-called bug bounty programs created to tackle different issues within the code. Many bug bounty programs focus on identifying issues within software or applications. However, others focus on server or website vulnerabilities.
In this first part of our Complete Guide to Keylogging in Linux, we will explore the basics of keylogging and its importance in the realm of Linux security, and dive deeper into keylogging in userspace, demonstrating how a keylogger can be written for Linux, by reading events directly from a keyboard device.
Last Friday, Microsoft announced that they have discovered a new botnet that exposes both Windows and Linux computers and web servers to new threats. The botnet, known as Sysrv-K, takes advantage of unpatched computers by installing cryptocurrency miners.
With the rise of cloud computing and mobility and the remote work environment brought on by the pandemic, securing Linux endpoint devices has never been more challenging for the organization and its IT department. Endpoint encryption designed to protect data stored on endpoints such as devices, hardware and files has always been an essential component of a strong Linux endpoint security strategy; however, perimeter security is no longer effective in protecting against sophisticated threats in this modern, mobile era.
Greetings fellow Linux security enthusiasts,
Interested in becoming a LinuxSecurity contributor, but need an article topic idea and some guidance to help you get started?
With the growing number of espionage scandals in recent years and the prevalence of online tracking, protecting your privacy online has never been more important. Virtually everything we do online is tracked these days, whether for profit or to obtain information to sell to third parties, which has led to the development of tools like the Tor Browser to help us navigate the Internet safely and strengthen our privacy online.
Every day in the headlines, we're made aware of how limited our online privacy truly is. These days, it's so easy for apps, websites and search engines to track our every move. While most tracking is done to improve targeted marketing efforts, this can be very annoying and isn't the only way our data is used. Staying private online and avoiding being tracked is the best option to ensure our security while browsing and using apps.
Data encryption has never been more important. New data protection and privacy regulations, such as GDPR, mean that companies storing unencrypted customer information are vulnerable to paying heavy fines. The public is now more aware of the importance of encryption, with massive data breaches impacting companies like Facebook receiving major media coverage.
The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime, by Jon DiMaggio comes at a time in American History when everyone ranging from business owners to private citizens can no longer turn a blind eye to the need for cybersecurity.
Recent years have demonstrated that Windows users are not the only ones who should be concerned about malware. Linux is becoming an increasingly popular target among malware operators due to the growing popularity of the open-source OS and the high-value devices it powers worldwide. Security researchers from AT&T Alien Labs are now warning that “cyber gangs have started infecting Linux machines via a fileless malware installation technique that until recently was more commonly used against Windows-based systems”.