Intrusion Detection Platform-independent and extensible IDS with PreludeMar 23, 2011
The Prelude security information management system receives both host- and network-based IDS messages and displays them in an easy web interface. We show you how to set it up.more »
Security Lessons: Secure Video Secure Video SurveillanceMar 01, 2011
Unless your surveillance cameras are wired directly to a video board, they are notoriously insecure. We show you how to keep your cameras from being compromised.more »
Security Lessons: HTML5 HTML5 – Building a better botnetJan 31, 2011
New web technologies address shortcomings in web browsers but create new problems as well.more »
Security Lessons: OpenID User authentication for the massesDec 28, 2010
Outsourcing authentication services gives you access to more services – at a price. Kurt examines the pros and cons of distributed authentication.more »
The Institute for Security and Open Methodologies (ISECOM) announced the released of the Open Source Security Testing Methodology Manual (OSSTMM) 3.0.more »
Caine The Caine 2.0 forensic distributionNov 29, 2010
Caine is a Linux distribution based on Ubuntu 10.04 for forensic scientists and security-conscious administrators. Poised to do battle against IT ne’er-do-wells, Caine has a comprehensive selection of software, a user-friendly GUI, and responsive support.more »
Security Lessons: Passwords Avoid password fatigue with a password storage systemNov 23, 2010
Keeping track of all your passwords can be tricky. Kurt says: Keep your friends close and your passwords closer.more »
Centrify Express now available through the Ubuntu Software Partner Repository.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.