Nmap Scripting Automated penetration testing with Nmap’s new scripting engineNov 12, 2008
Nmap is rolling out a new scripting engine to automatically investigate vulnerabilities that turn up in a security scan. We’ll show you how to protect your network with Nmap and NSE.more »
Sun Microsystems has added three new members to its Storage 7000 family that include Open Source software.more »
Adobe cautions in an advisory against a whole series of flaws in Adobe Reader 8.1.2. Most of them also affect Linux.more »
Hackers of the XDA Forum found a simple hack to gain access to root privileges on the Android platform of G1 mobile phones.more »
The Enterprise Security API (ESAPI), a set of documentation focusing on application software security, has released a new version 1.4. Javadocs were updated and old interfaces were replaced.more »
Linux Magazine is broadcasting a live stream from ApacheCon US 2008, LA, New Orleans (November 5 through 7). The keynotes from the developer conference are available free of charge.more »
Free antivirus toolkit ClamAV released a stopgap version 0.94.1 to fix a number of bugs, but also to provide a new feature.more »
USENIX Security 2008 Researchers and practitioners head to San JoseOct 31, 2008
The 17th Security Symposium met in San Jose, California, USA, during the week of July 28, with a refereed paper track and Invited Talks.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm