Tags: encryption

Serious Flaw in WPA2 Protocol Lets Attackers Intercept Passwords and Much More

Researchers have disclosed a serious weakness in the WPA2 protocol that allows attackers within range of vulnerable device or access point to intercept passwords, e-mails, and other data presumed to be encrypted, and in some cases, to inject ransomware or other malicious content into a website a...
Read 0 Comments

IBM's Plan to Encrypt Unthinkable Amounts of Sensitive Data

DATA BREACHES AND exposures all invite the same lament: if only the compromised data had been encrypted. Bad guys can only do so much with exfiltrated data, after all, if they can't read any of it. Now, IBM says it has a way to encrypt every level of a network, from applications to local databases...
Read 0 Comments

Encryption Technology in Your Code Impacts Export Requirements

US export laws require companies to declare what encryption technology is used in any software to be exported. The use of open source makes complying with these regulations a tricky process. US Export Requirements The regulations on US software exports come from the US Commerce Department’s Bureau...
Read 0 Comments

lets-encrypt-logo.png

Let’s Encrypt
Jillian Karner, operations engineer at Let’s Encrypt, expounds on the project’s emphasis on automation.

Ops Engineer Explains Let’s Encrypt’s Automated TLS/SSL Certificate Issuance

Let’s Encrypt is a free, automated and open Certificate Authority issuing digital certificates for website encryption globally. Let’s Encrypt is a service provided by the Internet Security Research Group (ISRG), a public benefit organization with a mission to reduce financial, technological, and...
Read 0 Comments

cncf_dan_kohn.png

Dan Kohn CNCF
This week, Cloud Native Computing Foundation announced Google is donating gRPC, its high performance remote procedure call (RPC) framework, to the foundation. Here pictured: Dan Kohn, CNCF Executive Director, at Cloud Native Day 2016.

This Week in Open Source, CNCF Announces 6th Managed Project, Changes in OSS Accelerate SDN & More

This week in open source news, CNCF adds gRPC to list of existing projects, making it the sixth, and other stories. Keep reading to stay on top of your news this week! 1) The Linux Foundation's Cloud Native Computing Foundation (CNCF) announced it's adding gRPC open source protocol to list of...
Read 0 Comments

Linus Torvalds on SHA-1 and Git: 'The Sky Isn't Falling'

Yes, SHA-1 has been cracked, but that doesn't mean your code in Git repositories is in any real danger of being hacked. The real worry about Google showing SHA-1 encryption is crackable, as pointed out by Peter Gutmann, a cryptography expert at the at the University of Auckland, New Zealand, is "...
Read 0 Comments

EFF: Half of Web Traffic is Now Encrypted

Half of the web’s traffic is now encrypted, according to a new report from the EFF released this week. The rights organization noted the milestone was attributable to a number of efforts, including recent moves from major tech companies to implement HTTPS on their own properties. Over the years,...
Read 0 Comments

Security Hygiene for Software Professionals

As software makers, we face a unique threat model. The computers or accounts we use to develop and deliver software are of more value to an attacker than what ordinary computer users have—cloud service keys can be stolen and used for profit, and the software we ship can be loaded with malware ...
Read 0 Comments

How to Password Protect a Folder on Linux/Unix without Encryption

As operating systems, Linux/Unix put the user's privacy and safety above all. While this has resulted in a product that many people swear by, it's also led to certain features that may not be easy to discern at first sight. For instance, the possibility of password protecting directories without...
Read 0 Comments

top-security-tutorials.jpg

security tutorials
Check out these top tutorials from Linux.com to help you improve your Linux server security.

Best Linux Server Security Tutorials on Linux.com

The first rule of Linux server security is to keep your server lean and mean. Only install the packages and run the services that you really need, writes Swapnil Bhartiya in his Linux.com tutorial on making your server more secure. “Even the most hardened servers can be hijacked by exploiting any...
Read 0 Comments

Pages

Click Here!