Security http://www.linuxjournal.com/taxonomy/term/31/all/%22http%3A/jetico.com%22%3EJetico%3C/%22http%3A/jetico.com%22%3EJetico%3C/%22https%3A/istorage-uk.com%22%3EiStorage%3C/%22/content/%22/content/%22/content/%22https%3A/%22/content/lotfi-ben-othmane-martin-gilje-jaatun-and-edgar-weippls-empirical-research-software-security%22%3E en Zentera Systems, Inc.'s CoIP Security Enclave http://www.linuxjournal.com/content/zentera-systems-incs-coip-security-enclave <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/zentera-systems-incs-coip-security-enclave" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12251f3.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="69" /></a> </div> </div> </div> <!--paging_filter--><p> On the heels of being crowned "Cool Vendor in Cloud Security" by Gartner, <a href="https://zentera.net">Zentera Systems, Inc.</a>, announced an upgrade to its flagship CoIP Security Enclave solution.<span class="read-more"><a href="/content/zentera-systems-incs-coip-security-enclave"> more>></a></span></p> Cloud Enterprise Products Security Wed, 15 Nov 2017 12:38:33 +0000 James Gray 1339547 at http://www.linuxjournal.com Testing the Waters: How to Perform Internal Phishing Campaigns http://www.linuxjournal.com/content/testing-waters-how-perform-internal-phishing-campaigns <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/testing-waters-how-perform-internal-phishing-campaigns" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12162f1.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="137" /></a> </div> </div> </div> <!--paging_filter--><p> Phishing is one of the most dangerous threats to modern computing. Phishing attacks have evolved from sloppily written mass email blasts to targeted attacks designed to fool even the most cautious users. No defense is bulletproof, and most experts agree education and common sense are the best tools to combat the problem.<span class="read-more"><a href="/content/testing-waters-how-perform-internal-phishing-campaigns"> more>></a></span></p> HOW-TOs Security SysAdmin Tue, 31 Oct 2017 13:50:25 +0000 Jeramiah Bowling 1339535 at http://www.linuxjournal.com The Wire http://www.linuxjournal.com/content/wire <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/wire" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12188wiref1.png" alt="" title="" class="imagecache imagecache-node-page" width="200" height="195" /></a> </div> </div> </div> <!--paging_filter--><p> In the US, there has been recent concern over ISPs turning over logs to the government. During the past few years, the idea of people snooping on our private data (by governments and others) really has made encryption more popular than ever before. One of the problems with encryption, however, is that it's generally not user-friendly to add its protection to your conversations.<span class="read-more"><a href="/content/wire"> more>></a></span></p> Encryption Privacy Security Mon, 30 Oct 2017 12:09:27 +0000 Shawn Powers 1339534 at http://www.linuxjournal.com Lotfi ben Othmane, Martin Gilje Jaatun and Edgar Weippl's Empirical Research for Software Security (CRC Press) http://www.linuxjournal.com/content/lotfi-ben-othmane-martin-gilje-jaatun-and-edgar-weippls-empirical-research-software-security <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/lotfi-ben-othmane-martin-gilje-jaatun-and-edgar-weippls-empirical-research-software-security" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12237f5.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="317" /></a> </div> </div> </div> <!--paging_filter--><p> Developing truly secure software is no walk through the park.<span class="read-more"><a href="/content/lotfi-ben-othmane-martin-gilje-jaatun-and-edgar-weippls-empirical-research-software-security"> more>></a></span></p> Books Data Analytics Products Security Software Fri, 20 Oct 2017 16:47:34 +0000 James Gray 1339525 at http://www.linuxjournal.com iStorage diskAshur Storage Drives http://www.linuxjournal.com/content/istorage-diskashur-storage-drives <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/istorage-diskashur-storage-drives" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12237f1.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="67" /></a> </div> </div> </div> <!--paging_filter--><p> With software-free setup and operation, the new <a href="https://istorage-uk.com">iStorage</a> diskAshur group of ultra-secure storage drives works across all operating systems, including Linux, macOS, Android, Chrome, thin and zero clients, MS Windows and embedded systems. <span class="read-more"><a href="/content/istorage-diskashur-storage-drives"> more>></a></span></p> http://www.linuxjournal.com/content/istorage-diskashur-storage-drives#comments Embedded Hardware Products Security Storage Fri, 06 Oct 2017 16:50:38 +0000 James Gray 1339511 at http://www.linuxjournal.com Key Considerations for Software Updates for Embedded Linux and IoT http://www.linuxjournal.com/content/key-considerations-software-updates-embedded-linux-and-iot <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/key-considerations-software-updates-embedded-linux-and-iot" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12135f4.png" alt="" title="" class="imagecache imagecache-node-page" width="200" height="105" /></a> </div> </div> </div> <!--paging_filter--><p> The Mirai botnet attack that enslaved poorly secured connected embedded devices is yet another tangible example of the importance of security before bringing your embedded devices online. A new strain of Mirai has caused network outages to about a million Deutsche Telekom customers due to poorly secured routers.<span class="read-more"><a href="/content/key-considerations-software-updates-embedded-linux-and-iot"> more>></a></span></p> http://www.linuxjournal.com/content/key-considerations-software-updates-embedded-linux-and-iot#comments Embedded IOT Security Tue, 19 Sep 2017 14:05:04 +0000 Eystein Stenberg 1339495 at http://www.linuxjournal.com Caldwell Partners' Cyber Advisory Board Service http://www.linuxjournal.com/content/caldwell-partners-cyber-advisory-board-service <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/caldwell-partners-cyber-advisory-board-service" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/computer-1294045_640_1.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="200" /></a> </div> </div> </div> <!--paging_filter--><p> For many enterprises, cyber risk is the top business risk. Meanwhile, there is simply not a sufficiently large talent pool of cyber-risk professionals to satisfy the ever-growing demand.<span class="read-more"><a href="/content/caldwell-partners-cyber-advisory-board-service"> more>></a></span></p> http://www.linuxjournal.com/content/caldwell-partners-cyber-advisory-board-service#comments Enterprise Products Security Fri, 15 Sep 2017 16:04:01 +0000 James Gray 1339493 at http://www.linuxjournal.com Postmortem: What to Do After a Security Incident http://www.linuxjournal.com/content/postmortem-what-do-after-security-incident <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/postmortem-what-do-after-security-incident" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/hqdefault_5.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="150" /></a> </div> </div> </div> <!--paging_filter--><p> Incidents happen. Vulnerabilities happen. The quality of your response can make the difference between a bad day and a disaster. What happens after the response can make the difference between endless firefighting and becoming stronger with every battle. A quality postmortem analysis is free ammunition.<span class="read-more"><a href="/content/postmortem-what-do-after-security-incident"> more>></a></span></p> http://www.linuxjournal.com/content/postmortem-what-do-after-security-incident#comments HOW-TOs Security Tue, 25 Jul 2017 12:13:34 +0000 Susan Sons 1339447 at http://www.linuxjournal.com All Your Accounts Are Belong to Us http://www.linuxjournal.com/content/all-your-accounts-are-belong-us <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/all-your-accounts-are-belong-us" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12140f2.png" alt="" title="" class="imagecache imagecache-node-page" width="200" height="160" /></a> </div> </div> </div> <!--paging_filter--><p> Last weekend my work phone suddenly stopped working. Not the phone itself, but rather all service stopped. I first noticed (of course) due to an inability to load any web pages. Then I tried calling someone and realized my phone was disconnected. In fact, when someone tried to call me, it said the line was no longer in service.<span class="read-more"><a href="/content/all-your-accounts-are-belong-us"> more>></a></span></p> http://www.linuxjournal.com/content/all-your-accounts-are-belong-us#comments Mobile Security Thu, 13 Jul 2017 13:47:47 +0000 Shawn Powers 1339441 at http://www.linuxjournal.com Never Trust Yellow Fruit http://www.linuxjournal.com/content/never-trust-yellow-fruit <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/never-trust-yellow-fruit" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12119pineapplef2.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="156" /></a> </div> </div> </div> <!--paging_filter--><p> You've probably heard about the WiFi Pineapple from Hak5. It's a fascinating device that allows you to do some creepy pen testing. It's the sort of tool that could be used for evil, but it's also incredibly useful for securing networks. <span class="read-more"><a href="/content/never-trust-yellow-fruit"> more>></a></span></p> http://www.linuxjournal.com/content/never-trust-yellow-fruit#comments Networking Security Tue, 20 Jun 2017 14:34:45 +0000 Shawn Powers 1339418 at http://www.linuxjournal.com BlueCat DNS Edge http://www.linuxjournal.com/content/bluecat-dns-edge <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/bluecat-dns-edge" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12187f2.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="51" /></a> </div> </div> </div> <!--paging_filter--><p> Migration to the cloud, the flexibility of network virtualization and the promise of IoT involve IT transformations that have placed incredible strain on enterprise security.<span class="read-more"><a href="/content/bluecat-dns-edge"> more>></a></span></p> http://www.linuxjournal.com/content/bluecat-dns-edge#comments Cloud Enterprise IOT Networking Products Security Mon, 19 Jun 2017 11:27:04 +0000 James Gray 1339417 at http://www.linuxjournal.com Jetico's BestCrypt Container Encryption for Linux http://www.linuxjournal.com/content/jeticos-bestcrypt-container-encryption-linux-0 <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/jeticos-bestcrypt-container-encryption-linux-0" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12187f1.png" alt="" title="" class="imagecache imagecache-node-page" width="200" height="144" /></a> </div> </div> </div> <!--paging_filter--><p> Cyber-attacks are now constant, threats to privacy are increasing, and more rigid regulations are looming worldwide. To help IT folks relax in the face of these challenges, <a href="http://jetico.com">Jetico</a> updated its BestCrypt Container Encryption solution to include Container Guard. <span class="read-more"><a href="/content/jeticos-bestcrypt-container-encryption-linux-0"> more>></a></span></p> http://www.linuxjournal.com/content/jeticos-bestcrypt-container-encryption-linux-0#comments Encryption Privacy Products Security Fri, 16 Jun 2017 16:22:09 +0000 James Gray 1339416 at http://www.linuxjournal.com Improving Linux Security with DevSecOps http://www.linuxjournal.com/content/improving-linux-security-devsecops <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/improving-linux-security-devsecops" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/security-1202344_640_6.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="113" /></a> </div> </div> </div> <!--paging_filter--><p> Ask people who run IT departments these days what keeps them up at night, and they'll probably tell you it's security&mdash;or the lack of it. With the explosive growth of malicious attacks on everything from hospitals to Fortune 500s, security&mdash;not hardware, software and even staff&mdash;is what currently makes life miserable. <span class="read-more"><a href="/content/improving-linux-security-devsecops"> more>></a></span></p> http://www.linuxjournal.com/content/improving-linux-security-devsecops#comments DevOps Enterprise Security Wed, 31 May 2017 14:15:11 +0000 John S. Tonello 1339407 at http://www.linuxjournal.com Wibu-Systems CmASIC http://www.linuxjournal.com/content/wibu-systems-cmasic <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/wibu-systems-cmasic" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12173f4.jpg" alt="" title="" class="imagecache imagecache-node-page" width="200" height="124" /></a> </div> </div> </div> <!--paging_filter--><p> Wibu-Systems describes the new generation of its CmASIC module as "the answer to the security-by-design needs of modern embedded computing technology leaders:. CmASIC is a module that Intelligent Device Manufacturers (IDMs) can directly embed into their boards to provide out-of-the box security and entitlement management. <span class="read-more"><a href="/content/wibu-systems-cmasic"> more>></a></span></p> http://www.linuxjournal.com/content/wibu-systems-cmasic#comments Embedded Products Security Fri, 19 May 2017 15:30:38 +0000 James Gray 1339394 at http://www.linuxjournal.com CyKick Labs Ltd.'s Telepath http://www.linuxjournal.com/content/cykick-labs-ltds-telepath <div class="field field-type-filefield field-field-node-image"> <div class="field-items"> <div class="field-item odd"> <a href="/content/cykick-labs-ltds-telepath" class="imagecache imagecache-node-page imagecache-linked imagecache-node-page_linked"><img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/node-page/nodeimage/story/12168f8.png" alt="" title="" class="imagecache imagecache-node-page" width="200" height="50" /></a> </div> </div> </div> <!--paging_filter--><p> When a shopper enters a store, the retailer doesn't know if the person will simply browse, make purchases, shoplift or hold up the register. The same goes for visitors to a website. The challenge is to prevent and stop the bad guys without hindering beneficial customer transactions. <span class="read-more"><a href="/content/cykick-labs-ltds-telepath"> more>></a></span></p> http://www.linuxjournal.com/content/cykick-labs-ltds-telepath#comments Big Data Products Security Wed, 03 May 2017 13:27:29 +0000 James Gray 1339374 at http://www.linuxjournal.com