Security fixes address a few vulnerabilities in Mozilla Thunderbird and SeaMonkey.more »
Ratproxy The Ratproxy security scanner looks for vulnerabilities in web applicationsMar 31, 2009
Google's Ratproxy is a free testing tool that searches for security problems in web applications.more »
At the CanSecWest Vancouver 2009 conference's PWN2OWN hacker's competition the Safari, Internet Explorer 8 and Firefox browsers were successfully hacked to run code on their systems. The Chrome browser was recognized as being the least impacted by the hackers.more »
Security tester ProCheckUp has found critical bugs in Novell's GroupWise WebAccess that could allow e-mail theft.more »
One-Time Passwords on the Web Implementing a one-time password system on the webJan 31, 2009
Add security to your website with a one-time password system.more »
Counterfeit links are able to deceive the Firefox and Chrome browsers, directing users to unintended websites.more »
The Shoreline Firewall product, also known as Shorewall, has arrived in its 4.2.4 version. The new release includes a configuration tool for IPv6 networks.more »
Bit9, self-professed leader in enterprise application whitelisting, recently included Mozilla's Firefox browser among "the Dirty Dozen" applications with critical security vulnerabilities. Mozilla's security expert Jonathan Nightingale disputes that critique.more »
New partnership will bring more and better CS training to US schools
Criminals offer online help over Tor network
Sophisticated malware is still present on Joomla and WordPress sites around the world.
Future versions of Ubuntu's code service will support the popular Git version control system used with Linux and other open source projects.
New release marks the arrival of AMD’s unified driver strategy.
A new study by IDC charts big changes in the big hardware market.
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.