The KDE Display Manager (KDM) can be exploited to allow users to log in without a password. This would give users the ability to log in as other users or even root.more »
A moderately critical vulnerability was discovered in the QUtf8Decoder of Trolltech's Qt Framework.more »
The latest version of Samba, 3.0.26, removes a moderately critical vulnerability that only occurs in combination with Microsoft's Active Directory Service.more »
No less than five vulnerabilities were eradicated by the release of a new version of the Apache Web server.more »
A joint survey performed by security experts from Infowatch and Russia's Securitylab points to the dangers that Instant Messengers (IM) can mean to enterprise communications structures.more »
The developers of the free bug tracking system, Bugzilla, advise users of older versions to update for security reasons.more »
Linux distributor Red Hat has discovered a vulnerability in the GNU "tar" program that could allow attackers to overwrite files.more »
Bluetooth Hacks Exploring the secrets of Bluetooth in LinuxJun 30, 2007
The user rules in Linux – if you know where you’re going. This month the trail leads deep into the Linux Bluetooth stack.more »
But you can still be a non-voting “individual supporter” if you pay the money
Several current systems could fall victim to the attack
Latest Linux engine comes with better graphics and support for Intel's new power-saving chips.
Hackers send a message of beauty and liberation to server logs
Citrix gets excited about new Pi-Powered XenDesktop client system
Linux on Azure cert heralds a new era for Redmond.
Proposals for presentations at the CeBIT Open Source Forum will be accepted through 24 January 2016.
Adobe looks for a new start; renames its embattled Flash tool.
The Pi's popular Raspbian OS pursues secrecy without entropy.
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.