The Mask: Scary New Face of Internet Intrusion

Feb 11, 2014

Ultra-sophisticated attack tool might have originated from a state-sponsored intelligence service.

more »

New Worm Attacks Linux Devices

Dec 03, 2013

Symantec says Linux-Darlloz burrows in through PHP.

more »

Sneaky New Linux Attack Discovered

Nov 18, 2013

Innovative back door looks like normal SSH traffic.

more »

Kernel Rootkit Tricks The Spy Within

Mar 11, 2013

Rootkits allow attackers to take complete control of a computer. We describe the tricks intruders use to gain access to the Linux kernel and provide guidelines on hardening the kernel against such attacks.

more »

Customizing PortSentry Do you have a sentry to keep an eye on your servers?

Apr 24, 2012

PortSentry monitors your ports and lets you know when they’ve been scanned.

more »

BackTrack Linux 5 R2 Released

Mar 09, 2012

Full release of BackTrack Linux 5 R2 is now available.

more »

Security Lessons: Modified Code Attacks Detecting source code modification attacks

Sep 02, 2011

Learn how to protect yourself against malicious attacks by modified source code.

more »

Red Hat Summit and JBoss World: May 3-6

Apr 13, 2011

Red Hat announces IBM, Accenture, Alfresco, Cisco, HP and Intel representatives are scheduled to deliver keynotes at the seventh annual Red Hat Summit and JBoss World, May 3-6, 2011 in Boston, Massachusetts.

more »
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News