Users only had 7 hours to update before the intrusions started.more »
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.more »
Vulnerability affects many Linux web serversmore »
What’s New in Samba 4 Samba 4May 06, 2013
In December 2012, the open source world received the first, and very long awaited, release of the Samba 4.x series.more »
Firefox Extensions Getting More from FirefoxFeb 24, 2013
Firefox features many high-quality extensions to help improve productivity, protect your privacy, and more.more »
FTC hopes to build trust between app providers and mobile users through more transparent data practices.more »
PHP Security Principles Seven principles for preventing vulnerabilities in PHP programmingOct 26, 2012
Many web attacks are the result of programmer error. Sloppy code testing leaves a door open for the uninvited.more »
Testing Password Quality Creating secure passwords and testing their qualityOct 09, 2012
Create secure passwords with the help of a password generator and check for quality at the same time.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.