Linux security risks and threats News
January 30, 2015
PHP applications, including WordPress, are vulnerable to the GHOST Linux exploit, but overall the flaw may not be as dangerous as first thought.
November 16, 2008
LAMP's status as the undisputed open source stack has dimmed to a largely symbolic role as the number of open source applications has expanded.
August 04, 2008
A Trusted Computer Solutions security tool helps protect Linux servers from attack. The tool will be featured at the 2008 LinuxWorld show.
August 03, 2008
SELinux has made strides in protecting systems from intrusion by unauthorized access but its lack of user-friendliness remains a weakness.
Evaluate Linux security risks and threats Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Start hardening your Linux servers with this guide to essential tools and applications for Linux security, including SELinux, Nagios, firewalls and more. Continue Reading
A security expert recommends cfengine and Puppet as two open source endpoint policy management tools, along with cautionary advice on their usage. Continue Reading
Get the power of Linux-based security tools on Windows with this free suite of open source security tools. Contributor and vulnerability assessment expert Kevin Beaver introduces BackTrack and explains its network security testing features. Continue Reading
Manage Linux security risks and threats
Learn to apply best practices and optimize your operations.
'Secure' is a relative term when talking SSH remote access to servers. Keep your Linux servers under lock and key with these simple sshd tweaks. Continue Reading
The open source tool nmap is ideal for network troubleshooting, scanning and auditing. The tool can be used to identify devices on the network as well as the services running on them. It can also identify advanced information, such as operating ... Continue Reading
Simple Event Correlation is an open source tool designed for reading incoming data feeds and performing actions based on user-defined rules. Learn how to install and configure this small- to medium-sized enterprise appropriate tool. Continue Reading
Problem Solve Linux security risks and threats Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Hackers thrive on exploiting open source Web application source code. But these tactics can protect your corporate applications from common security vulnerabilities and breaches. Continue Reading
Strong Linux network security can be meaningless if physical security is compromised. In this tip, a security expert outlines some common Linux physical security threats. Continue Reading
Linux security is commonly overlooked in IT security policies, especially when management is out of touch with what’s happening on the ground. Continue Reading