Security Lessons: Password Storage Storing your passwords properlySep 23, 2011
High-performance graphics cards and proper storage can help keep your passwords secure.more »
November 2011: DVD Inlay Issue #132Sep 23, 2011
This issue’s DVD comes with the BackTrack 5 R1  pen test distribution. BackTrack provides a great collection of pen testing and security auditing tools. You can boot into BackTrack Live from the DVD or install BackTrack permanently on your hard disk.more »
The Wireshark free network sniffer rolls out 1.6 release with advanced features.more »
Security Lessons: JTAG Hacking Owning your own stuffMay 31, 2011
Who’s device is it? Just because you bought it doesn’t mean you can look inside. But the Internet has plenty of resources for jailbreakers.more »
BackTrack, an Ubuntu-based penetration-testing distribution, offers "major improvements" over previous releases, including support for 32- and 64-bit architectures, KDE 4, Gnome, and Fluxbox.more »
Snort Helpers Snort Helpers: Open Source Network Intrusion DetectionMay 02, 2011
Snort is the de facto standard for open source network intrusion detection. The developer community has kept a fairly low profile for a couple of years, but extensions like Snorby, OpenFPC, and Pulled Pork have given the old hog a new lease on life.more »
Red Hat announces IBM, Accenture, Alfresco, Cisco, HP and Intel representatives are scheduled to deliver keynotes at the seventh annual Red Hat Summit and JBoss World, May 3-6, 2011 in Boston, Massachusetts.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm