Sneaky New Linux Attack Discovered

Nov 18, 2013

Innovative back door looks like normal SSH traffic.

more »

Kernel Rootkit Tricks The Spy Within

Mar 11, 2013

Rootkits allow attackers to take complete control of a computer. We describe the tricks intruders use to gain access to the Linux kernel and provide guidelines on hardening the kernel against such attacks.

more »

Customizing PortSentry Do you have a sentry to keep an eye on your servers?

Apr 24, 2012

PortSentry monitors your ports and lets you know when they’ve been scanned.

more »

BackTrack Linux 5 R2 Released

Mar 09, 2012

Full release of BackTrack Linux 5 R2 is now available.

more »

Security Lessons: Modified Code Attacks Detecting source code modification attacks

Sep 02, 2011

Learn how to protect yourself against malicious attacks by modified source code.

more »

Red Hat Summit and JBoss World: May 3-6

Apr 13, 2011

Red Hat announces IBM, Accenture, Alfresco, Cisco, HP and Intel representatives are scheduled to deliver keynotes at the seventh annual Red Hat Summit and JBoss World, May 3-6, 2011 in Boston, Massachusetts.

more »

OSSTMM 3.0 Released

Dec 15, 2010

The Institute for Security and Open Methodologies (ISECOM) announced the released of the Open Source Security Testing Methodology Manual (OSSTMM) 3.0.

more »

Security Lessons Plugin Vulnerabilities

Oct 27, 2010

Plugins provide a lot of functionality but, depending on their quality, they can provide unwanted security issues as well. We show you how to protect yourself from plugins.

more »
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News