Featured Linux Articles - Page 9
Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
Need an in-depth introduction to a new security topic? Our features articles will bring up up-to-date on everything from buffer overflows to SE Linux policy development.
Thank you to Lerma for contributing this article. What is the impact of AI on cybersecurity today? AI is making a difference for companies feeling the pinch of strained resources. The resilience of tech-savvy cyber hackers is another reason cybersecurity strategists are quickly adopting artificial intelligence-powered solutions.
Nowadays, Linux systems are considered fairly secure, as people think that Linux rarely gets infected with malware such as viruses, rootkits, worms, etc. You might also see that we hardly ever come across Antivirus software being sold for Linux, giving the illusion that Linux is an ultimately secure Operating System.
End-to-end encryption is an increasingly popular method that online services are using to ensure their users’ security. End-to-end encryption, also known as E2EE, encodes messages sent from one user to another in a way that ensures that only the sender and recipient can decode the message.
In the previous part of our Hacker's Corner series, we covered anti-debugging using a trivial self-modifying code. Here, instead of blocking debugging completely, we will detect various debugger-induced activities.
In our previous Hacker's Corner article, we covered some simple anti-debugging. Here, we will see some better techniques.
While the internet provides many benefits, it also brings new risks and challenges. One of the most common and notable of these is the threat to our privacy. Some users might think that they are protected by their browser, search engine and antivirus programs. However, the truth is that most of us aren’t doing nearly enough to keep websites from tracking us.
Today, one of the most popular ways for free websites and browsers to make a profit is tracking and selling user data to advertisers. While most tracking is behind the scenes and discreet, allowing oneself to be tracked can have negative consequences–attackers often attempt to track users the same way legitimate companies do in order to steal data; not to mention the growing concern of companies using data purchased from legitimate sources to manipulate users.
Globally, there are roughly 30,000 web-based cyberattacks daily, primarily targeting smaller businesses and smaller websites. To put it into perspective, that is an estimated 1 cyberattack every 3 seconds that targets websites specifically.
Thank you to Anastasios Arampatzis for contributing this article. With web and API security becoming an increasingly important aspect of software development, “shift left” is gaining wide acceptance as a best practice to ensure security integrates with development early. More and more cybersecurity companies are releasing relevant products and capabilities, and the practice is becoming almost de facto for engineering teams.
Technology is developing and advancing tremendously. New inventions are delivered to the market every year and all of these improve the entire domain a lot. But because there are so many options and opportunities on the market, you might end up feeling more confused than at the beginning.
With email-related attacks becoming increasingly prevalent and serious, securing your business email accounts is more important than ever before.
As open-source software becomes increasingly common in the infrastructure of businesses, it is essential to ensure the security of the software being relied upon. An increasingly popular cyber security solution is open-source SAST (Static Application Security Testing) and DAST (Dynamic Analysis Security Testing) security scanning, which give IT technicians and developers the ability to access the code of a certain piece of software to remove threats or improve the strength of its security.
This article will explore the key benefits and potential drawbacks of open source security in under a minute.
Looking to secure your Joomla website? Here are some best practices to prevent your Joomla website from getting hacked by cyberattackers in 2022.
It can be pretty fulfilling to improve your career in cybersecurity, and there are plenty of methods you can consider that will help boost your capabilities. The need for cybersecurity professionals has increased over the past few years; an Accenture report stated that 68% of business leaders find their cybersecurity risks to be increasing, and a survey from the Linux Foundation explained that companies are trying to hire more open-source talent to help companies install protection throughout their systems.
While allowing public access to the sensitive behind-the-scenes operation of a program sounds risky, open-source software actually has the potential to be even more secure than a program with hidden code. However, as with any type of software, vulnerabilities still exist and can present a serious security risk if they remain unidentified and unpatched.
As we rapidly transition to an increasingly digital society, data protection is a greater concern than ever before. Encryption is one of the most effective and widely used methods of securing sensitive information from unauthorized parties. In this article, we'll introduce you to some Linux file and disk encryption tools we love to help you safeguard critical data and protect your privacy online.
Ethical hacking might sound contradictory, but leveraging the skills of the ‘white hat’ hacker community has done a great deal for safety and security on the internet. Nowhere does this show more than through so-called bug bounty programs created to tackle different issues within the code. Many bug bounty programs focus on identifying issues within software or applications. However, others focus on server or website vulnerabilities.
Last Friday, Microsoft announced that they have discovered a new botnet that exposes both Windows and Linux computers and web servers to new threats. The botnet, known as Sysrv-K, takes advantage of unpatched computers by installing cryptocurrency miners.