Trick Attackers with Portspoof FlytrapFeb 24, 2014
The Internet is a tough place to live – especially for publicly accessible computers. A small tool called Portspoof makes port scanning a real challenge for attackers.more »
Almost every wireless LAN has some potential security weaknesses. The Wifislax Slackware derivative helps detect and eliminate them.more »
Qubes OS Exploring the Qubes OS secure operating systemJan 27, 2014
Most operating systems claim to be secure; however, most fail terribly. Newcomer Qubes OS tries a different approach, relying on a microkernel and pervasive virtualization.more »
A new web application helps users visualize distributed denial-of-service attacks.more »
Communication in the Post-PRISM World PRISM Break: Part 1Aug 12, 2013
Linux users didn’t need the recent NSA eavesdropping scandal to convince them that securing communication was a good idea. For years, free software developers have been creating secure tools that offer similar functionalities to all of those popular but very leaky services with ridiculous names.more »
Security Lessons: GlusterFS Secure storage with GlusterFSJul 02, 2013
You can create distributed, replicated, and high-performance storage systems using GlusterFS and some inexpensive hardware. Kurt explains.more »
Security Lessons: Signing Code Insecure updates are the rule, not the exceptionMay 31, 2013
Kurt looks at the practice of code signing and examines why so few upstream open source projects actually do it.more »
Stopping Drive-By Attacks Tools to prevent drive-by attacksMay 31, 2013
You won't find a perfect solution to the growing problem of drive-by attacks, but many tools are available to help you keep malicious code off your network.more »
New release comes with better semantic search and improvements to Kontact.
Annual code quality report shows FOSS is more secure at all project size levels.
The Raspberry Pi Foundation has announced an even smaller version of the tiny computer that will fit into a DIMM slot.
A new class of problems lets a malicious app pre-configure an invisible privilege update.
New Hack language adds static typing and other conveniences.
New crypto policy system will offer easier configuration and more uniform security.
Ubuntu founder denounces insecurity in proprietary, close-source software blobs.
Vulnerability affects many Linux web servers
The Bavarian capital shuns Microsoft, Google, and other alternatives to implement an open source groupware solution.
Phone vendor partnerships bring Mark Shuttleworth's dream of Ubuntu on a phone a step closer to reality.