Hotspotter Attacks on wireless clientsJul 01, 2005
Security experts are always concerned with WLAN access points, but they sometimes forget that the client is also open to attack. Public hotspots make it quite easy for attackers to hijack connections, as the Hotspotter tool demonstrates.more »
Security Intro Knowing the ways of the enemyJul 01, 2005
Encrypting Email Encrypting Email with KMail, Mozilla Thunderbird, and EvolutionMar 01, 2005
The leading email applications include new features for helping users secure and authenticate their mail messages, but each tool has a different approach to handling tasks such as signing and encryption. This article describes how to add encryption and digital signatures to the Thunderbird, Kmail, and Evolution mail clients.more »
Secure Email Intro Mail Tools for a Hostile PlanetMar 01, 2005
Don’t look now, but your mailbox is full of junk, and a snooper is live on a distant server, reading your opinions of your boss. Remember when email used to be easy? To restore some sanity to your correspondence, you’ll need the right tools.more »
Go Wireless Intro Wireless Networking in LinuxFeb 01, 2005
When you’re going wireless,it pays to be careful. Get the right hardware,and make sure your network is as secure as you think it is.more »
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.