Critical Security Vulnerabilities Handling critical security vulnerabilities: Three incidentsFeb 22, 2013
We look at what makes a security issue critical and how upstream developers and vendors respond by examining three incidents: CVE-2013-0156, CVE-2013-0333, and rubygems.org. incident response handling.more »
Memory Analysis Forensic analysis of memory on LinuxFeb 22, 2013
In computer forensics, memory analysis is becoming increasingly important as a means for investigating security incidents. In this article, we provide an overview of the various memory dumping options on Linux and introduce the support in Linux for the Volatility Analysis Framework.more »
Digital Signatures and Encryption with SSL Secure email and LibreOffice documentsDec 19, 2012
Using personal, self-signed certificates and digital encryption.more »
The Electronic Frontier Foundation (EFF) publishes a blog post critical of the new search feature included in Ubuntu 12.10.more »
Security Lessons: Web Frameworks Evaluating web frameworksOct 26, 2012
Stop re-inventing the wheel and build your web applications with the excellent tools already available.more »
- AMD/OpenJDK/Oracle explore use of GPUs
- Smartphone security
- ASF Airavata
- Slackware 14 release
- Shuttleworth funds Inktank/Ceph
- New Apache toplevel project
- Zentyal 3.0 small business server reveals major release
- Keccak wins NIST
- SHA-3 competition
Side Channel Attacks Some web applications send unnecessary information to attackersAug 23, 2012
Sometimes error messages or log entries are too verbose for their own good, disclosing valuable information to attackers.more »
OpenVAS The OpenVAS vulnerability scannerAug 23, 2012
The more IT infrastructure complexity increases, the more indispensable vulnerability scanners become. If you are not interested in retaining the consulting services of a professional hacker, you might want to entrust the task of detecting vulnerabilities to a specialized software tool, such as OpenVAS.more »
Popular open source encryption tool is vulnerable to attack
New “Yakkety Yak” edition emphasizes cloud and servers
Google finally enters the phone hardware business.
Innovative system adds a hard drive and Ubuntu Core to the RPi for an IoT hub.
Linux is two weeks younger than we thought!
The Apache Software Foundation considers retiring OpenOffice
Adobe won’t kill the plugin in 2017
Linux Foundation's big event celebrates the 25th anniversary of Linux
Linux has evolved from “won’t be a professional” project to one of the most professional software projects in the history of computers.