Security Lessons: Disposable Computers Avoiding cyberattackSep 29, 2010
One way to avoid having your personal information stolen is to use a disposable computer set up for sensitive operations.more »
The secure communication solution gets an upgrade.more »
Security Lessons: Checking Signatures Signed, sealed, and deliveredJul 27, 2010
How to avoid malicious code on Linux.more »
Filter Proxy for AD Virus scanner and content filter with AD authenticationJun 29, 2010
You might want to reap the benefits of active directory’s single sign-on for your virus scanning and content filtering. If you also use Squid to handle user access to the internet, you have a front-row seat for “when worlds collide.”more »
Security Lessons: DNSSEC DNSSEC primerJun 28, 2010
One of the largest holes in the Internet is finally plugged.more »
Security Blanket Scanning, fixing, and reporting security issues with Security BlanketJun 24, 2010
Trusted’s Security Blanket lets you analyze security compliance in a few easy steps.more »
FCC's authority called into questionmore »
Security Lessons: Secure Programming As with marriage, SSL security success is in the detailsJan 26, 2010
Something old, something new, something borrowed, and something blue.more »
The Internet community officially banishes the notoriously unsafe Secure Sockets Layer protocol.
Popular desktop environment continues the Gnome 2 legacy – with new support for the Gnome 3 toolkit.
The Obama White House has issued a memorandum telling all US government agencies they must use HTTPS for all websites and web communication.
New program will dial up security for the Firefox browser.
Red Hat's community distro embraces the cloud.
New partnership will bring more and better CS training to US schools
Criminals offer online help over Tor network
Sophisticated malware is still present on Joomla and WordPress sites around the world.
Future versions of Ubuntu's code service will support the popular Git version control system used with Linux and other open source projects.
New release marks the arrival of AMD’s unified driver strategy.