HUGE List of Security Blogs: Unix, Linux, Windows - Part 4 ==> HUGE List of Security Blogs (Unix/Linux/Windows) <== ==> all packed with superb information & updated frequently <== --> [01/05/2012] <== http://blogs.adobe.com/psirt/ http://anti-virus-rants.blogspot.com/ http://asert.arbornetworks.com/ http://blog.avast.com/ http://www.blackbag.nl/ http://www.bunniestudios.com/wordpress/ http://cansecwest.com/ http://carnal0wnage.attackresearch.com/ http://www.cerias.purdue.edu/site/blog http://cerias.purdue.edu/site/blog/author/spaf http://blogs.cisco.com/security http://blog.clamav.net/ http://blog.commandlinekungfu.com/ http://computer.forensikblog.de/en/ http://www.cryptogon.com/ http://www.cryptome.org/ http://www.cutawaysecurity.com/blog/ http://cyb3rcrim3.blogspot.com/ http://garwarner.blogspot.com/ http://cyberspeak.libsyn.com/ http://ddanchev.blogspot.com/ http://darknet.org.uk/ http://darkreading.com/ http://www.thedarkvisitor.com/ http://blog.didierstevens.com/ http://digfor.blogspot.com/ http://edsmiley.com/ http://emergentchaos.com/ http://blog.emsisoft.com/ http://blog.eset.com/ http://fasthorizon.blogspot.com/ http://www.financialcryptography.com/ http://blog.fireeye.com/research http://www.forensickb.com/ http://fraudwar.blogspot.com/ http://www.f-secure.com/weblog http://blog.oxff.net/ http://gleeda.blogspot.com/ http://googleonlinesecurity.blogspot.com/ http://www.sophos.com/blogs/gc http://grandstreamdreams.blogspot.com/ http://www.hackaday.com/ http://ha.ckers.org/blog http://www.hexblog.com/ http://holisticinfosec.blogspot.com/ http://honeyblog.org/ http://www.h-online.com/security/ http://blogs.iss.net/ http://invisiblethings.org/ http://theinvisiblethings.blogspot.com/ http://jeremiahgrossman.blogspot.com/ http://krebsonsecurity.com/ http://www.l0t3k.org/en/ http://blog.layeredsec.com/ http://www.lightbluetouchpaper.org/ http://blog.trendmicro.com/ http://www.malwaredomainlist.com/ http://chargen.matasano.com/ http://www.avertlabs.com/research/blog/ http://blog.metasploit.com/ http://blogs.technet.com/mmpc/default.aspx http://securityincite.com/blog/mike-rothman http://www.milw0rm.com/ http://blog.mandiant.com/ http://www.offensivecomputing.net/ http://www.offensive-security.com/blog/ http://www.openrce.org/articles/ http://www.packetstormsecurity.org/ http://philosecurity.org/ http://praetorianprefect.com/ http://www.prevx.com/blog.asp http://pseudo-flaw.net/log/ http://www.rationalsurvivability.com/blog/ http://rdist.root.org/ http://blogs.sans.org/ https://blogs.sans.org/computer-forensics/ http://www.schneier.com/blog http://blog.zoller.lu/ http://www.fas.org/blog/secrecy/ http://www.secsocial.com/blog/ http://secunia.com/advisories/ http://www.securelist.com/en/weblog http://blogs.securiteam.com/ http://blog.security4all.be/ http://securosis.com/blog http://www.shmoocon.org/ http://www.shmoo.com/news/ http://blog.snort.org/ http://blog.stopbadware.org/ http://sunbeltblog.blogspot.com/ http://www.symantec.com/business/security_response/weblog/ http://taosecurity.blogspot.com/ http://www.teamfurry.com/wordpress/ http://blogs.technet.com/msrc/ http://blog.threatexpert.com/ http://threatpost.com/ http://blog.tsa.gov/ http://blog.uncommonsensesecurity.com/ http://volatility.tumblr.com/ http://securitylabs.websense.com/ http://windowsir.blogspot.com/ http://www.wired.com/threatlevel/ http://blogs.zdnet.com/security/ http://blog.zynamics.com/ http://www.afcea.org/signal/signalscape/ http://dhs-daily-report.blogspot.com/ https://blog.torproject.org/ http://www.securitywire.com/ http://pauldotcom.com/ http://www.exploit-db.com/ http://www.networkworld.com/topics/security.html http://www.acunetix.com/blog/ http://www.allspammedup.com/ http://www.gfi.com/blog/ http://www.infosecblog.org/ http://www.techrepublic.com/blog/security http://www.theemailadmin.com/ http://www.theregister.co.uk/security/ http://seclists.org/ http://www.afcea.org/signal/signalscape/ http://www.woodmann.com/forum/blog.php http://www.nsa.gov/ http://blogs.technet.com/b/sysinternals/ http://www.securityweek.com/ http://superantispyware.com/blog/ http://www.securitytracker.com/ http://spyblog.org.uk/ http://www.net-security.org/ http://news.cnet.com/security http://www.fas.org/blog/ssp/ Project/Wiki: Freedom Box: http://wiki.debian.org/freedombox http://blogs.pcmag.com/securitywatch/ http://labs.m86security.com/ http://www.irongeek.com/ http://rijmenants.blogspot.com/ Cipher Machines & Cryptology / Intelligence / Security "Cipher machines & cryptology, history of Signals Intelligence and Communications Security, espionage and intelligence services, from WW2, over the Cold World era, to date." http://blog.webroot.com/ http://crypto.stanford.edu/ https://ssd.eff.org/ http://publicintelligence.net/ http://www.wikileaks.org/ http://www.itstactical.com/ http://www.forensicswiki.org/ http://p4r4n0id.com/ http://cryptocomb.org/ http://anonymous.livelyblog.com/ https://trac.torproject.org/projects/tor/wiki http://www.security-ray.com/ http://ticklethewire.com/ http://vulnfactory.org/blog/ https://psal.cs.drexel.edu/index.php/Main_Page http://www.pgpboard.com/ https://yorkporc.wordpress.com/ http://www.catonmat.net/ http://www.heinz.cmu.edu/~acquisti/shb/participants.htm http://www.cyberciti.biz/ http://www.omgubuntu.co.uk/ http://www.ledge.co.za/software/lpinotes/ http://inciweb.org/ https://www.ibm.com/developerworks/linux/ https://www.ibm.com/developerworks/topics/ https://www.ibm.com/developerworks/ https://www.ibm.com/developerworks/aix/library/ http://www.neowin.net/forum/topic/934274-freeware-alternative-list/ http://www.hackinglinuxexposed.com/articles/ http://dankaminsky.com/ http://blog.bodhizazen.net/ http://askubuntu.com/ -==> New Links below! 01/05/2012 <==- http://computer-forensics.sans.org/blog https://365.rsaconference.com/blogs/rsa-conference-blog https://365.rsaconference.com/blogs/critical-infrastructure https://365.rsaconference.com/blogs/ira-winkler https://365.rsaconference.com/blogs/ediscovery https://365.rsaconference.com/blogs/securityreading https://365.rsaconference.com/blogs/fred-stock http://securityblog.verizonbusiness.com/ http://www.flyingpenguin.com/ https://blog.whitehatsec.com/ http://robert.penz.name/ https://fightinginsecurity.wordpress.com/ http://www.cristoncox.com/ http://www.paranoidprose.com/ http://dvlabs.tippingpoint.com/blog/ "For those who are interested in mobile/wireless in general, and wireless LANs in particular, this page provides resource links about 802.11 and related security and mobility topics" -- Lisa Phifer, Core Competence, Inc. http://www.corecom.com/html/wlan.html http://www.wmarkbrooks.com/ https://www.veracode.com/blog/ http://devcentral.f5.com/weblogs/macvittie/Default.aspx http://chuvakin.blogspot.com/ http://gigaom.com/cloud/ http://lastwatchdog.com/ http://www.cryptosmith.com/ http://blogs.verisign.com/innovation/ https://chainmailcheck.wordpress.com/ http://superconductor.voltage.com/ http://www.educatedguesswork.org/ https://techbuddha.wordpress.com/ http://www.scmagazine.com/the-data-breach-blog/section/1263/ https://www.brandenwilliams.com/blog/ http://infosecplace.com/blog/ http://www.thetechherald.com/security http://www.clerkendweller.com/ http://blog.tenablesecurity.com/ http://coffeetocode.net/ http://technicalinfodotnet.blogspot.com/ http://www.teamshatter.com/ http://www.stratumsecurity.com/blog/ http://www.cgisecurity.com/ http://blog.spywareguide.com/ https://amtso.wordpress.com/ http://blog.spiderlabs.com/ https://gregness.wordpress.com/ http://daveshackleford.com/ https://marienfeldt.wordpress.com/ http://blog.rootshell.be/ http://www.thesecuritysamurai.com/ http://community.websense.com/blogs/securitylabs/default.aspx http://securitybraindump.blogspot.com/ http://dsecrg.blogspot.com/ http://blog.c22.cc/ http://securityandrisk.blogspot.com/ http://www.social-engineer.org/framework/Social_Engineering_Framework http://blog.gerhards.net/ http://www.paranoidprose.com/ http://www.sensepost.com/blog/ https://pinvoke.wordpress.com/ http://www.liquidmatrix.org/blog/ http://www.standalone-sysadmin.com/blog/ http://infolookup.securegossip.com/ http://blog.watchfire.com/wfblog/ http://www.frontlinesentinel.com/ http://elie.im/blog/ http://maliciousattacker.blogspot.com/ Most Powerful Voices in Security Who are the Top 25? The Rest of the Top 100 - * 100 security guru's listed with their Twitter pages and personal/blog sites: (Sep. 8, 2011) Posted here as one link rather than posting around 100 Twitter personal pages. http://www.sys-con.com/node/1974029 - Publications: http://bsdmag.org/ http://hakin9.org/ http://magazine.hackinthebox.org/ http://www.uninformed.org/ https://www.net-security.org/insecuremag.php - Forums: http://www.wilderssecurity.com/ http://www.wilderssecurity.com/showthread.php?t=242949 http://hardforum.com/showthread.php?t=781545 http://www.binrev.com/forums/ http://hak5.org/forums/ Link to part 3, older previous posting: http://pastebin.com/vgj3qKDW We'll continue with another post in the future here @ pastebin.com !