Hotspotter Attacks on wireless clientsJul 01, 2005
Security experts are always concerned with WLAN access points, but they sometimes forget that the client is also open to attack. Public hotspots make it quite easy for attackers to hijack connections, as the Hotspotter tool demonstrates.more »
Security Intro Knowing the ways of the enemyJul 01, 2005
Encrypting Email Encrypting Email with KMail, Mozilla Thunderbird, and EvolutionMar 01, 2005
The leading email applications include new features for helping users secure and authenticate their mail messages, but each tool has a different approach to handling tasks such as signing and encryption. This article describes how to add encryption and digital signatures to the Thunderbird, Kmail, and Evolution mail clients.more »
Secure Email Intro Mail Tools for a Hostile PlanetMar 01, 2005
Don’t look now, but your mailbox is full of junk, and a snooper is live on a distant server, reading your opinions of your boss. Remember when email used to be easy? To restore some sanity to your correspondence, you’ll need the right tools.more »
Go Wireless Intro Wireless Networking in LinuxFeb 01, 2005
When you’re going wireless,it pays to be careful. Get the right hardware,and make sure your network is as secure as you think it is.more »
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.