Security Lessons: Disposable Computers Avoiding cyberattackSep 29, 2010
One way to avoid having your personal information stolen is to use a disposable computer set up for sensitive operations.more »
The secure communication solution gets an upgrade.more »
Security Lessons: Checking Signatures Signed, sealed, and deliveredJul 27, 2010
How to avoid malicious code on Linux.more »
Filter Proxy for AD Virus scanner and content filter with AD authenticationJun 29, 2010
You might want to reap the benefits of active directory’s single sign-on for your virus scanning and content filtering. If you also use Squid to handle user access to the internet, you have a front-row seat for “when worlds collide.”more »
Security Lessons: DNSSEC DNSSEC primerJun 28, 2010
One of the largest holes in the Internet is finally plugged.more »
Security Blanket Scanning, fixing, and reporting security issues with Security BlanketJun 24, 2010
Trusted’s Security Blanket lets you analyze security compliance in a few easy steps.more »
FCC's authority called into questionmore »
Security Lessons: Secure Programming As with marriage, SSL security success is in the detailsJan 26, 2010
Something old, something new, something borrowed, and something blue.more »
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.