Choosing a Spam Filter Spam Filter MechanicsApr 20, 2016
Spam filters have different modes of operation. Understanding how they work can help you choose which one to use.more »
New intrusion technique affects most non-Bluetooth wireless micemore »
3ROS attack tool lowers the technical bar so anyone can be an intruder.more »
If attackers are on your system, saving your passwords in a password vault is no protection.more »
Faulty hash algorithm persists, despite efforts by experts to raise awareness.more »
Powerful man-in-the-middle attack is now targeting online shopping.more »
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.more »
Report from the X-Force group says attackers are using TOR to hide their crimesmore »
But if you are not using the latest Linux kernel, your system is insecure.
Home routers will give room for custom firmware but still comply with FCC rules
Frank Karlitschek will continue to lead the open source ownCloud project
“Xenial Xerus” comes with a new packages format and several improvements for the enterprise.
Linux users can now download and install the Windows code editor
New initiative will address security and interoperability concerns around container technology.
Developers can use RHEL as a development platform without a subscription fee.
Windows users will soon have native access to the Bash shell.
Improvements to SMTP will provide better guarantee of confidentiality
Graphics vendor embraces new reality in Linux graphics