Fluendo, Lineo Solutions, Mocana, and NVidia join the Linux Foundation and see the benefits of Linux in the future of computing.more »
Cloud Storage Behind the Firewall Bridging the Cloud and BYOD GapMar 09, 2012
ownCloud's new commercial venture lets you manage risk and data exposure in a bring-your-own-device age.more »
Full release of BackTrack Linux 5 R2 is now available.more »
Charly’s Column: w3af The sys admin’s daily grind: w3afMar 02, 2012
After toiling away to create a small but exclusive website, Charly wanted to run a security scanner against it to check for vulnerabilities. The choice of tools is enormous, but Charly chose w3af.more »
Security Lessons: Fixing SSL How to fix SSLMar 02, 2012
We look at some new approaches to certificate verification.more »
Security Lessons: Self-Defense Separating the wheat from the chaffFeb 02, 2012
Attackers impose a high price on your limited resources. We look at some ways to separate the good from the bad.more »
Security Lessons: Interoperability Interoperability and code reuseJan 03, 2012
Developing cross-platform apps can be difficult and error prone. We offer some tips to ease the work.more »
Security Lessons: Rescue Tools Rescuing data from attackersNov 30, 2011
When attackers strike your system, you need to determine exactly what damage has been done. Here are some tools to help.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm