Should you trust an online service to store your online passwords?more »
Offensive Security announces the release of Kali Linux – their “most advanced, robust, and stable penetration testing distribution to date.”more »
Critical Security Vulnerabilities Handling critical security vulnerabilities: Three incidentsFeb 22, 2013
We look at what makes a security issue critical and how upstream developers and vendors respond by examining three incidents: CVE-2013-0156, CVE-2013-0333, and rubygems.org. incident response handling.more »
Table of Contents: 149 What's inside the April 2013 issueFeb 22, 2013
This month, we show you how to automate tasks in LibreOffice and give you some tools to tighten system security.more »
Memory Analysis Forensic analysis of memory on LinuxFeb 22, 2013
In computer forensics, memory analysis is becoming increasingly important as a means for investigating security incidents. In this article, we provide an overview of the various memory dumping options on Linux and introduce the support in Linux for the Volatility Analysis Framework.more »
Digital Signatures and Encryption with SSL Secure email and LibreOffice documentsDec 19, 2012
Using personal, self-signed certificates and digital encryption.more »
Table of Contents: 147 What's inside the February 2013 issueDec 19, 2012
Use these advanced troubleshooting techniques to save lost Windows and Linux systems.more »
The Electronic Frontier Foundation (EFF) publishes a blog post critical of the new search feature included in Ubuntu 12.10.more »
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.