A French-based Englishman, John Graham-Cumming, is about 666,666 clicks away from creating a weapon to kill spam for good.
A free Web browser that bills itself as a tool for privacy protection is, in fact, a click-fraud engine for pornographic Web sites, security vendor Panda Software warned Friday.
A mass e-mail sent out last week by open-source database vendor MySQL erroneously contained the e-mail addresses of about 9,300 customers instead of information on a series of software-support special offers that the company meant to publicize.
KDE made two security announcements today, the KDM Symlink Vulnerability is a potential local exploit on systems using KDM as their login manager. Artswrapper return value checking vulnerability affects Linux 2.6 systems that have artswrapper installed SUID root.
Linux is insecure. Open source is insecure. Windows is insecure. All software is insecure.
Deal with it.
OpenOffice.org responded Friday to claims in the media that the first virus had been discovered for the open source productivity suite. The group said that macro viruses are possible in any program that supports the feature.
A recently discovered security issue in Snort, the open source intrusion prevention and detection technology used in government agencies and many large corporations, could allow attackers to bypass security on compromised machines.
Tony Griffiths has reported a vulnerability in the Linux Kernel, which can be exploited malicious, local users to cause a DoS (Denial of Service).
SSH, the wonder tool of the security set, is misused by your users more easily and more often than you may think. John Traenkenschuh points out how well-intentioned administrators are using SSH to create gaping holes in their own security, and what you can do about it.
Linux software provider Red Hat issued a security advisory for a number of its products, addressing a series of kernel vulnerabilities in the operating system software.
SecurityFocus has a vulnerability advisory about an issue with the GNU strings command and a potential Denial of Service attack. If a file contains certain character strings, the string command will crash due to a failure to properly handle unexpected user-supplied input.
We have confirmed a bug in Firefox 184.108.40.206 with DoS possibilities. When you download the source of the following page you will see what it does. It will open 100 mailforms, so be cautions when you open the link!
Coverity, Inc., makers of the world’s most advanced and scalable source code analysis solution, today announced that as a result of their contract with US Department of Homeland Security (DHS), the biggest X Window System security vulnerability of the last six years was identified and fixed.
Marcel Holtmann has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. The vulnerability has been reported in versions prior to 220.127.116.11.
The government announced yesterday (Wednesday) that it is testing a security architecture intended to bolster protection of public sector IT systems from hackers and security breaches.
Not everyone has "l33t skilz" or mass amounts of hardened TCP/IP stack programming experience. When I'm at work, I don't look at logs all day long, nor do I run security audits every five minutes. I do my job, which takes all of my time. This is the situation for most small to medium sized companies that have only a few IT guys. So how does an everyday IT guy handle the constant threat of impending attack?
How do I scan my Linux system for rootkits, worms, trojans, etc.?
Either with ckrootkit or with rkhunter.
MORE attacks were directed at Linux systems in the Philippines during the first quarter of 2006, a report from a local security research group revealed.