Security Lessons: Modified Code Attacks Detecting source code modification attacks

Sep 02, 2011

Learn how to protect yourself against malicious attacks by modified source code.

more »

Red Hat Summit and JBoss World: May 3-6

Apr 13, 2011

Red Hat announces IBM, Accenture, Alfresco, Cisco, HP and Intel representatives are scheduled to deliver keynotes at the seventh annual Red Hat Summit and JBoss World, May 3-6, 2011 in Boston, Massachusetts.

more »

OSSTMM 3.0 Released

Dec 15, 2010

The Institute for Security and Open Methodologies (ISECOM) announced the released of the Open Source Security Testing Methodology Manual (OSSTMM) 3.0.

more »

Security Lessons Plugin Vulnerabilities

Oct 27, 2010

Plugins provide a lot of functionality but, depending on their quality, they can provide unwanted security issues as well. We show you how to protect yourself from plugins.

more »

Security Lessons: Disposable Computers Avoiding cyberattack

Sep 29, 2010

One way to avoid having your personal information stolen is to use a disposable computer set up for sensitive operations.

more »

Adobe Issues Security Warning for Android Flash Player

Sep 15, 2010

Critical vulnerability, now for Android

more »

Security Lessons: Checking Signatures Signed, sealed, and delivered

Jul 27, 2010

How to avoid malicious code on Linux.

more »

Malicious Screensaver: Malware on Gnome-Look.org

Dec 10, 2009

A screensaver from Gnome-Look.org at closer look revealed itself to be malware.

more »
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News