Security Lessons: Capabilities A life of privilegeJun 21, 2012
Granting root access, even temporarily, is rife with danger. Capabilities could help.more »
UEFI and Secure Boot No Free BootsJun 20, 2012
The imminent Windows 8 implementation of UEFI with Secure Boot adds an extra layer of complexity for some Linux users. We look at the problem and two solutions from Fedora and Canonical.more »
SUSE Linux Enterprise Server 11 SP2 offers major improvements in performance, security, and hardware support.more »
SEAndroid SEAndroid brings better security to Android devicesMay 29, 2012
The still experimental but promising SEAndroid framework offers SELinux-like mandatory access control for the Android universe.more »
Security Lessons: Hacking Hardware Don’t forget your hardwareMay 29, 2012
Now that your networks are secure and you’ve convinced your users to secure their passwords and software, it’s time to turn your attention to your hardware to keep it from being attacked.more »
Secure your enterprise, monitor system performance, and more by harnessing the power of Splunk to search, monitor, report, and analyze events and data from any source.more »
For its size, fail2ban, a utility that scans logfiles and bans suspicious IP addresses, punches well above its weight.more »
You may have already tried PGP/GPG public key encryption for documents or mail, but do you know what’s going on under the hood and what level of security you’re actually getting? We take an in-depth look at GnuPG encryption.more »
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.