Cloud Storage Behind the Firewall Bridging the Cloud and BYOD GapMar 09, 2012
ownCloud's new commercial venture lets you manage risk and data exposure in a bring-your-own-device age.more »
Full release of BackTrack Linux 5 R2 is now available.more »
Charly’s Column: w3af The sys admin’s daily grind: w3afMar 02, 2012
After toiling away to create a small but exclusive website, Charly wanted to run a security scanner against it to check for vulnerabilities. The choice of tools is enormous, but Charly chose w3af.more »
Security Lessons: Fixing SSL How to fix SSLMar 02, 2012
We look at some new approaches to certificate verification.more »
Security Lessons: Self-Defense Separating the wheat from the chaffFeb 02, 2012
Attackers impose a high price on your limited resources. We look at some ways to separate the good from the bad.more »
Security Lessons: Interoperability Interoperability and code reuseJan 03, 2012
Developing cross-platform apps can be difficult and error prone. We offer some tips to ease the work.more »
Security Lessons: Rescue Tools Rescuing data from attackersNov 30, 2011
When attackers strike your system, you need to determine exactly what damage has been done. Here are some tools to help.more »
Security Lessons: Password Storage Storing your passwords properlySep 23, 2011
High-performance graphics cards and proper storage can help keep your passwords secure.more »
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems