Security Lessons: auditd Configuring and using auditdNov 26, 2012
The auditd tool can provide system logging capabilities to satisfy even the most paranoid users.more »
Researchers at Sandia National Laboratories have built a self-contained, Android-based network to study cyber disruptions and help secure hand-held devices.more »
Citrix announces version 6.1 of XenServer – a complete server virtualization platform built on the open source Xen hypervisor.more »
Testing Password Quality Creating secure passwords and testing their qualityOct 09, 2012
Create secure passwords with the help of a password generator and check for quality at the same time.more »
Red Hat has updated its messaging, real-time, and grid platform, Red Hat Enterprise MRG, to version 2.2.more »
The Zentyal Development Team releases Zentyal 3.0, a major release of its Linux small business server.more »
IPv6 Pen Testing Pen testing on IPv6 networksAug 23, 2012
If you have enabled IPv6 on your network without considering basic security issues, you might have opened up a hole for attackers. In this article, we demonstrate a successful attack on a server via IPv6 and explain how the popular security tools handle IPv6.more »
Security Lessons: Database Security Protecting your databaseAug 23, 2012
Your database can be one of the most vulnerable elements in your organization. We share some tips for detecting and preventing attacks.more »
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.