Spammers go low-volume, and 90% of IE browsers are unpatched.more »
New statute would require companies to report break-ins to consumers.more »
Weird data transfer technique avoids all standard security measures.more »
A new study says it is possible to unmask 81% of TOR users.more »
The US government rolls new best-practice rules for protecting SSH.more »
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.more »
Trick Attackers with Portspoof FlytrapFeb 24, 2014
The Internet is a tough place to live – especially for publicly accessible computers. A small tool called Portspoof makes port scanning a real challenge for attackers.more »
Almost every wireless LAN has some potential security weaknesses. The Wifislax Slackware derivative helps detect and eliminate them.more »
New partnership will bring more and better CS training to US schools
Criminals offer online help over Tor network
Sophisticated malware is still present on Joomla and WordPress sites around the world.
Future versions of Ubuntu's code service will support the popular Git version control system used with Linux and other open source projects.
New release marks the arrival of AMD’s unified driver strategy.
A new study by IDC charts big changes in the big hardware market.
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.