• Linux kernel has multiple flaws

    Users should update their systems against multiple denial-of-service and permission vulnerabilities in the Linux kernel, Gentoo said.

    SearchCIOMidmarket9,485 pointsBadges:
  • Gentoo fixes Linux kernel flaw

    Gentoo fixes a vulnerability in the Linux kernel 2.6 series that could be exploited for a remote denial-of-service attack.

    MMimoso3,355 pointsBadges:
  • Has perimeter security become obsolete?

    Tatu Ylönen, founder of Helsinki, Finland-based SSH Communications Security Corp., developed the Secure Shell protocol in 1995. Today, millions worldwide use it for secure remote logins and data transfers over the Internet. At next week's RSA Security conference, he'll give a presentation on how...

    SearchCIOMidmarket9,485 pointsBadges:
  • Red Hat patch update a malicious hoax

    Red Hat warned users to beware of bogus e-mails pretending to be an alert from its security team.

    SearchCIOMidmarket9,485 pointsBadges:
  • Serious security flaw fixed in Linux kernel

    A vulnerability in the Linux kernel has been patched and administrators are urged to repair their systems. The flaw could escalate a user's privileges and enable him to run code.

    MMimoso3,355 pointsBadges:
  • Microsoft admits Linux research is met with skepticism

    A Redmond executive says IT decision makers don't have to believe the numbers in Microsoft-backed studies to get something out of them.

    Margie Semilof4,270 pointsBadges:
  • Linux Malware Incident Response

    In this excerpt from Linux Malware Incident Response, authors Cameron Malin, Eoghan Casey and James Aquilina discuss volatile data collection methodology, steps and preservation.

    ITKE366,480 pointsBadges:
  • How to install an OSSEC server on Linux and an OSSEC Windows agent

    Learn how to install the free, host-based intrusion detection system OSSEC, with step-by-step instructions on setting up an OSSEC Linux server with an OSSEC Windows agent.

    ITKE366,480 pointsBadges:
  • Don’t dismiss possibility of malicious code on Linux

    As Linux rises in popularity on the desktop and enterprise servers, virus and worm writers will start to pay more attention to exploiting holes in open-source.

    MMimoso3,355 pointsBadges:
  • Review: With SSH Tectia, security is solid but deployment is difficult

    If SSH Communications Security makes it easier to deploy and use, SSH Tectia will step up as a robust enterprise product.

    searchsecurity23,075 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.