The Institute for Security and Open Methodologies (ISECOM) announced the released of the Open Source Security Testing Methodology Manual (OSSTMM) 3.0.more »
Control your privacy with this alternative.more »
The secure communication solution gets an upgrade.more »
Encrypting USB Sticks Protecting your USB sticks with encryptionJun 30, 2009
How easy is it to lose a USB stick? Why not protect your data just in case the stick falls into unfriendly hands?more »
Security Lessons The death of MD5 (and some SSL certificates)Feb 28, 2009
Researchers set out to compromise MD5 in an effort to convince people to stop using it. We explain how the attack worked and what this means for you.more »
The idea of an industry-wide common cryptography standard is certainly welcome. But self-interest usually precedes usability, so two industry consortiums are now vying over which standards to adopt, one on the side of Sun and the other leaning toward IBM/HP. Then there is an additional player in the Trusted Computing Group.more »
The Tor Project announces that it has removed all bugs that Coverity Scan had found in its software.more »
Charly's Column The sys admin's daily grind: Single-packet authenticationSep 30, 2008
Conventional, woodpecker-style port knocking is open to sniffing and brute force knocking attacks. Sending an encrypted packet with an access request to the server is safer and more modern. Learn more about Firewall Knock Operator, a.k.a. Fwknop.more »
Mozilla’s script blocker add-on could be putting malware sites on the whitelist.
The Internet community officially banishes the notoriously unsafe Secure Sockets Layer protocol.
Popular desktop environment continues the Gnome 2 legacy – with new support for the Gnome 3 toolkit.
The Obama White House has issued a memorandum telling all US government agencies they must use HTTPS for all websites and web communication.
New program will dial up security for the Firefox browser.
Red Hat's community distro embraces the cloud.
New partnership will bring more and better CS training to US schools
Criminals offer online help over Tor network
Sophisticated malware is still present on Joomla and WordPress sites around the world.
Future versions of Ubuntu's code service will support the popular Git version control system used with Linux and other open source projects.