This post explores how static application security testing can have an essential role in protecting against malware attacks.
Read moreTag: security
Linux cybersecurity mistakes businesses commonly make
Here are the most common mistakes users make which can lead to security problems.
Read moreCan You Use Tor on Linux?
Let’s check out what makes Tor different and how you can use it on Linux.
Read moreLinux for Starters: Your Guide to Linux – Become Anonymous – Part 18
Improve your privacy with these ways of reducing spying and snooping on your daily life. This article is part of the Linux for Starters series.
Read moreLinux Cybersecurity: What You Need to Know
Linux is an excellent choice for anyone who wants to improve their cybersecurity. Here’s what you can do to improve your cybersecurity.
Read moreLinux at Home: DIY security solutions for the home
Here’s our recommended open source solutions to create your own Linux-based surveillance system. ZoneMinder, Motion, and Kerberos.io are featured.
Read moreEssential System Tools: Firejail – Excellent Security Sandboxing
This article looks at Firejail, a SUID sandbox program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces, Linux capabilities and seccomp-bpf.
Read moreLKRG – Linux Kernel Runtime Guard
Linux Kernel Runtime Guard (LKRG) is a loadable kernel module that performs runtime integrity checking of the Linux kernel and detection of security vulnerability exploits against the kernel. As controversial as this concept is, LKRG attempts to post-detect and hopefully promptly respond to unauthorized modifications to the running Linux kernel (integrity checking) or to credentials (such as user IDs) of the running processes (exploit detection).
Read more