Server Security - Page 7.5
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
A data-breach-investigations report issued by Verizon earlier this year found 71 percent of all hacking attacks on business take place using remote access or desktop service.
With Wednesday's release of Mac OS X Lion, Apple has definitively leapfrogged its rivals by offering an operating system with state-of-the-art security protections that make it more resistant to malware exploits and other hack attacks, two researchers say.
News about intrusions into the servers of online stores, games vendors and other internet services can now be read on an almost daily basis. Often, the intruders obtain customers' login data including their passwords. As many people use the same password in multiple places, criminals can use the passwords to obtain unauthorised access to further services.
Common wisdom has held for years that Linux is superior to Windows when it comes to security issues. But now that open source is growing in popularity both on the consumer side (think Android phones) and the enterprise side (Linux runs the 10 fastest supercomputers in the world, for example, according to Wikipedia), it's time to push past the adage and look again at the whole "which is safer" issue.
"NSA recommending Vista for home security is merely a reflection of the reality of monopoly in the retail space," said blogger Robert Pogson. "In the USA probably as few as 2 to 3 percent of users use GNU/Linux, so a recommendation is almost useless." Those who are serious about security "are already aware of SELinux, a product of the NSA. The NSA is merely recommending that folks move on from XP, a poor OS poorly supported by M$."
The National Security Agency (NSA) recently published a report, "Best Practices for Keeping Your Home Network Secure" (PDF) in which it makes numerous recommendations designed to help home computer users avoid malware and other common problems.
Last issue we talked about the recent survey of IT managers concerning risk management in their enterprises conducted for Courion. Today we'll look at another recent survey which included IT managers -- and more.
Primarily a Windows article, but good general security ideas as well. "Glenn Phillips, president of Pelham, Ala.-based Fort
Hello, world! Today it's your Backup Day. World Backup Day is a new idea promoted by a small team of Redditors, and it's a good idea. You can never be too careful when it comes to backing up.
Here you are, adding yet another server to your virtualized environment that went from beta to production in the data center equivalent of zero to 60 in 4.5 seconds. That speed means the security policies and processes you routinely applied to physical servers probably went out the window over the past few years.
Thanks to Ars Technica and H-online.com, we now have intimate details of the Anonymous attack against security research company HBGary. There are no surprises in how the attacks where carried out, but we can draw many morals from the story, even if we've heard them time and time before.
Oh my God! There are security holes in Ubuntu 10.04! The sky is falling! Bill Gates is the maker of the one true operating system; forgive us Bill for we have worshiped at the feet of false Penguin idols. Oh please, give me a break!
According to the RSA 2011 Cybercrime Trends Report, the number one trend this year will be mobile device malware and the associated exploitation of mobile smart devices to commit fraud. The explosive growth of mobile smart devices as general purpose
At the ShmooCon hacker conference, security expert Jon Larimer from IBM's X-Force team demonstrated that Linux is far from immune from attacks via USB storage devices: during his presentation, the expert obtained access to a locked Linux system using a specially crafted USB flash drive, ...
The WordPress.org development team has released version 3.0.5 of its open source blogging and publishing platform, a maintenance and security update that addresses two vulnerabilities; these could have allowed a Contributor- or Author-level user to gain further access to the site.
Routing issues, slow network applications, DNS resolution problems -- a network administrator has to deal with a host of network nuisances on a daily basis. How do you survive when you're constantly under the gun to fix the problems? Like any other professional, you need a solid set of tools.
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.