Choosing a Spam Filter Spam Filter MechanicsApr 20, 2016
Spam filters have different modes of operation. Understanding how they work can help you choose which one to use.more »
New intrusion technique affects most non-Bluetooth wireless micemore »
3ROS attack tool lowers the technical bar so anyone can be an intruder.more »
If attackers are on your system, saving your passwords in a password vault is no protection.more »
Faulty hash algorithm persists, despite efforts by experts to raise awareness.more »
Powerful man-in-the-middle attack is now targeting online shopping.more »
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.more »
Report from the X-Force group says attackers are using TOR to hide their crimesmore »
The bug was introduced back in 2009 and has been lurking around all this time.
The new release deprecates the sshd_config UsePrivilegeSeparation option.
Lives on as a community project
Five new systems join Dell XPS 13 Developer Edition that come with Ubuntu pre-installed.
The Skype Linux client now has almost the same capabilities that it enjoys on other platforms.
At CeBIT 2017, OpenStack Day will offer a wide range of lectures and discussions.
A major setback for the Linux desktop.
Improved support for GPU in virtualization.
News site for the openSUSE community falls victim to a Wordpress exploit.
The source code is available online.