Eugene Teo has reported a vulnerability in the Linux Kernel, which potentially can be exploited by malicious, local users to gain escalated privileges.
TEN WELL AIMED silver bullets would take care of 80 per cent of the world's spam, according to the anti-spam organisation Spamhause. According to Security Pro News, Spamhause thinks that there are only ten people that are responsible for most of the spam in the world.
A UK law has been passed that makes it an offence to launch denial of service attacks, which experts had previously called "a legal grey area."
Linux developer and Red Hat veteran Alan Cox urges caution to those who think Linux security is foolproof
A recent security advisory announced today by Rapid7 explains, "the NVIDIA Binary Graphics Driver for Linux is vulnerable to a buffer overflow that allows an attacker to run arbitrary code as root.
Some vulnerabilities have been reported in the Linux 2.6 Kernel, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service).
This article shows how to install and run OSSEC HIDS, an Open Source Host-based Intrusion Detection System. It performs log analysis, integrity checking, rootkit detection, time-based alerting and active response. It helps you detect attacks, software misuse, policy violations and other forms of inappropriate activities.
In this guide you will learn how to tweak your Postfix/Amavisd setup to give better virus protection. If you want to achieve business grade virus protection you need to do a few small things so that there is less chance of the latest greatest script kiddie invention getting through. Therefore this tutorial shows how to install and use ClamAV, F-Prot, and McAfee UVScan.
Red Hat today announced its continuing commitment to superior security services with a new initiative, implemented by the National Institute of Standards and Technology (NIST), that enables members of the software industry to officially and publicly comment on vulnerabilities.