The Institute for Security and Open Methodologies (ISECOM) announced the released of the Open Source Security Testing Methodology Manual (OSSTMM) 3.0.more »
Security Lessons Plugin VulnerabilitiesOct 27, 2010
Plugins provide a lot of functionality but, depending on their quality, they can provide unwanted security issues as well. We show you how to protect yourself from plugins.more »
Security Lessons: Disposable Computers Avoiding cyberattackSep 29, 2010
One way to avoid having your personal information stolen is to use a disposable computer set up for sensitive operations.more »
Critical vulnerability, now for Androidmore »
Security Lessons: Checking Signatures Signed, sealed, and deliveredJul 27, 2010
How to avoid malicious code on Linux.more »
A screensaver from Gnome-Look.org at closer look revealed itself to be malware.more »
A botnet named psyb0t has been nesting for a few months in consumer devices that run on Linux with MIPS CPUs, notably routers. Infested devices connect through a botnet over a private Internet Relay Chat (IRC) server to await commands.more »
Vulnerability affects many Linux web servers
The Bavarian capital shuns Microsoft, Google, and other alternatives to implement an open source groupware solution.
Phone vendor partnerships bring Mark Shuttleworth's dream of Ubuntu on a phone a step closer to reality.
Donors will get to vote on new features for the free video editor.
Debian project puts init out to pasture and says no to Ubuntu's Upstart.
Ultra-sophisticated attack tool might have originated from a state-sponsored intelligence service.
New alternative for init comes with a small footprint and minimal configuration.
X marks the target for the next-generation windowing system.
Super-clone CentOS Linux gets beamed up to the mother ship.
HTML technology will enable new video editing and playback options.