Security Blog List

These are higher quality links dealing with security: Linux, Unix, Windows. None of them are dead. A large number of them update regularly. Now you can know what I know about the subject. Almost feel the need to apologize about the length.
  1. http://blogs.adobe.com/psirt/
  2. http://anti-virus-rants.blogspot.com/
  3. http://asert.arbornetworks.com/
  4. http://blog.avast.com/
  5. http://www.blackbag.nl/
  6. http://www.bunniestudios.com/wordpress/
  7. http://cansecwest.com/
  8. http://carnal0wnage.attackresearch.com/
  9. http://www.cerias.purdue.edu/site/blog
  10. http://cerias.purdue.edu/site/blog/author/spaf
  11. http://blogs.cisco.com/security
  12. http://blog.clamav.net/
  13. http://blog.commandlinekungfu.com/
  14. http://computer.forensikblog.de/en/
  15. http://www.cryptogon.com/
  16. http://www.cryptome.org/
  17. http://www.cutawaysecurity.com/blog/
  18. http://cyb3rcrim3.blogspot.com/
  19. http://garwarner.blogspot.com/
  20. http://cyberspeak.libsyn.com/
  21. http://ddanchev.blogspot.com/
  22. http://darknet.org.uk/
  23. http://darkreading.com/
  24. http://www.thedarkvisitor.com/
  25. http://blog.didierstevens.com/
  26. http://digfor.blogspot.com/
  27. http://edsmiley.com/
  28. http://emergentchaos.com/
  29. http://blog.emsisoft.com/
  30. http://blog.eset.com/
  31. http://fasthorizon.blogspot.com/
  32. http://www.financialcryptography.com/
  33. http://blog.fireeye.com/research
  34. http://www.forensickb.com/
  35. http://fraudwar.blogspot.com/
  36. http://www.f-secure.com/weblog
  37. http://blog.oxff.net/
  38. http://gleeda.blogspot.com/
  39. http://googleonlinesecurity.blogspot.com/
  40. http://www.sophos.com/blogs/gc
  41. http://grandstreamdreams.blogspot.com/
  42. http://www.hackaday.com/
  43. http://ha.ckers.org/blog
  44. http://www.hexblog.com/
  45. http://holisticinfosec.blogspot.com/
  46. http://honeyblog.org/
  47. http://www.h-online.com/security/
  48. http://blogs.iss.net/
  49. http://invisiblethings.org/
  50. http://theinvisiblethings.blogspot.com/
  51. http://jeremiahgrossman.blogspot.com/
  52. http://krebsonsecurity.com/
  53. http://www.l0t3k.org/en/
  54. http://blog.layeredsec.com/
  55. http://www.lightbluetouchpaper.org/
  56. http://blog.trendmicro.com/
  57. http://www.malwaredomainlist.com/
  58. http://chargen.matasano.com/
  59. http://www.avertlabs.com/research/blog/
  60. http://blog.metasploit.com/
  61. http://blogs.technet.com/mmpc/default.aspx
  62. http://securityincite.com/blog/mike-rothman
  63. http://www.milw0rm.com/
  64. http://blog.mandiant.com/
  65. http://www.offensivecomputing.net/
  66. http://www.offensive-security.com/blog/
  67. http://www.openrce.org/articles/
  68. http://www.packetstormsecurity.org/
  69. http://philosecurity.org/
  70. http://praetorianprefect.com/
  71. http://www.prevx.com/blog.asp
  72. http://pseudo-flaw.net/log/
  73. http://www.rationalsurvivability.com/blog/
  74. http://rdist.root.org/
  75. http://blogs.sans.org/
  76. https://blogs.sans.org/computer-forensics/
  77. http://www.schneier.com/blog
  78. http://blog.zoller.lu/
  79. http://www.fas.org/blog/secrecy/
  80. http://www.secsocial.com/blog/
  81. http://secunia.com/advisories/
  82. http://www.securelist.com/en/weblog
  83. http://blogs.securiteam.com/
  84. http://blog.security4all.be/
  85. http://securosis.com/blog
  86. http://www.shmoocon.org/
  87. http://www.shmoo.com/news/
  88. http://blog.snort.org/
  89. http://blog.stopbadware.org/
  90. http://sunbeltblog.blogspot.com/
  91. http://www.symantec.com/business/security_response/weblog/
  92. http://taosecurity.blogspot.com/
  93. http://www.teamfurry.com/wordpress/
  94. http://blogs.technet.com/msrc/
  95. http://blog.threatexpert.com/
  96. http://threatpost.com/
  97. http://blog.tsa.gov/
  98. http://blog.uncommonsensesecurity.com/
  99. http://volatility.tumblr.com/
  100. http://securitylabs.websense.com/
  101. http://windowsir.blogspot.com/
  102. http://www.wired.com/threatlevel/
  103. http://blogs.zdnet.com/security/
  104. http://blog.zynamics.com/
  105. http://www.afcea.org/signal/signalscape/
  106. http://dhs-daily-report.blogspot.com/
  107. https://blog.torproject.org/
  108. http://www.securitywire.com/
  109. http://pauldotcom.com/
  110. http://www.exploit-db.com/
  111. http://www.networkworld.com/topics/security.html
  112. http://www.acunetix.com/blog/
  113. http://www.allspammedup.com/
  114. http://www.gfi.com/blog/
  115. http://www.infosecblog.org/
  116. http://www.techrepublic.com/blog/security
  117. http://www.theemailadmin.com/
  118. http://www.theregister.co.uk/security/
  119. http://seclists.org/
  120. http://www.afcea.org/signal/signalscape/
  121. http://www.woodmann.com/forum/blog.php
  122. http://www.nsa.gov/
  123. http://blogs.technet.com/b/sysinternals/
  124. http://www.securityweek.com/
  125. http://superantispyware.com/blog/
  126. http://www.securitytracker.com/
  127. http://spyblog.org.uk/
  128. http://www.net-security.org/
  129. http://news.cnet.com/security
  130. http://www.fas.org/blog/ssp/
  131. http://cryptocomb.org/
  132. http://anonymous.livelyblog.com/
  133. https://trac.torproject.org/projects/tor/wiki
  134. http://www.security-ray.com/
  135. http://ticklethewire.com/
  136. http://vulnfactory.org/blog/
  137. https://psal.cs.drexel.edu/index.php/Main_Page
  138. http://www.pgpboard.com/
  139. https://yorkporc.wordpress.com/
  140. http://www.catonmat.net/
  141. http://www.heinz.cmu.edu/~acquisti/shb/participants.htm
  142. http://www.cyberciti.biz/
  143. http://www.omgubuntu.co.uk/
  144. http://www.ledge.co.za/software/lpinotes/
  145. http://inciweb.org/
  146. https://www.ibm.com/developerworks/linux/
  147. https://www.ibm.com/developerworks/topics/
  148. https://www.ibm.com/developerworks/
  149. https://www.ibm.com/developerworks/aix/library/
  150. http://www.neowin.net/forum/topic/934274-freeware-alternative-list/
  151. http://www.hackinglinuxexposed.com/articles/
  152. http://dankaminsky.com/
  153. http://blog.bodhizazen.net/
  154. http://askubuntu.com/
  155. Freedom Box: http://wiki.debian.org/freedombox
  156. http://blogs.pcmag.com/securitywatch/
  157. http://labs.m86security.com/
  158. http://www.irongeek.com/
  159. http://rijmenants.blogspot.com/
  160. http://blog.webroot.com/
  161. http://crypto.stanford.edu/
  162. https://ssd.eff.org/
  163. http://publicintelligence.net/
  164. http://www.wikileaks.org/
  165. http://www.itstactical.com/
  166. http://www.forensicswiki.org/
  167. http://p4r4n0id.com/


The list came from Cryptome. I had a great many of the sites bookmarked already, but can not take credit for compiling the entire thing. Would have mentioned this sooner, but find it bothersome linking to the same site repeatedly.
 
Subscribe by Email. . . RSS. . .
Creative Commons License
Symbols of Decay is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License..
Related written works at Angelfire, Sex Symbols, Cymbals of Silence.Repent or Die