Linux Secure

3 articles

Secure Mobility Message Resonates at MILCOM 2011

By Chip Downing MILCOM 2011 last week in Baltimore, MD was not only educational, but it was a watershed event.   Last year, it was a “coming out” party for custom Android devices; this year however, was the year where many companies are now using COTS hardware and software to their fullest extent, along the entire supply chain, from core to…

Unmanned Systems: More Reports of Security Vulnerabilities

By Joe Wlad By now, you’ve likely heard the latest report of security holes in unmanned ground control systems. This time, a key-logging virus has been found on one or more hard drives at the Nevada operations center for the Predator and Reaper unmanned vehicles. While the investigation is ongoing and impact of the virus is determined, the real concern…

Linux, Common Criteria and OS Protection Profiles

By Paul Parkinson In 2011, computer and network security news stories, which were previously the preserve of specialist journals and blogs, have become commonplace in the mainstream media. There are now many different types of threat, which are sometimes categorised into hacktivist, e-crime and most recently, advanced persistent threats (APT). Whilst some of these attacks have exploited zero day vulnerabilities,…