The Institute for Security and Open Methodologies (ISECOM) announced the released of the Open Source Security Testing Methodology Manual (OSSTMM) 3.0.more »
Security Lessons Plugin VulnerabilitiesOct 27, 2010
Plugins provide a lot of functionality but, depending on their quality, they can provide unwanted security issues as well. We show you how to protect yourself from plugins.more »
Security Lessons: Disposable Computers Avoiding cyberattackSep 29, 2010
One way to avoid having your personal information stolen is to use a disposable computer set up for sensitive operations.more »
Critical vulnerability, now for Androidmore »
Security Lessons: Checking Signatures Signed, sealed, and deliveredJul 27, 2010
How to avoid malicious code on Linux.more »
A screensaver from Gnome-Look.org at closer look revealed itself to be malware.more »
A botnet named psyb0t has been nesting for a few months in consumer devices that run on Linux with MIPS CPUs, notably routers. Infested devices connect through a botnet over a private Internet Relay Chat (IRC) server to await commands.more »
The Internet community officially banishes the notoriously unsafe Secure Sockets Layer protocol.
Popular desktop environment continues the Gnome 2 legacy – with new support for the Gnome 3 toolkit.
The Obama White House has issued a memorandum telling all US government agencies they must use HTTPS for all websites and web communication.
New program will dial up security for the Firefox browser.
Red Hat's community distro embraces the cloud.
New partnership will bring more and better CS training to US schools
Criminals offer online help over Tor network
Sophisticated malware is still present on Joomla and WordPress sites around the world.
Future versions of Ubuntu's code service will support the popular Git version control system used with Linux and other open source projects.
New release marks the arrival of AMD’s unified driver strategy.