Security Lessons The death of MD5 (and some SSL certificates)Mar 01, 2009
Researchers set out to compromise MD5 in an effort to convince people to stop using it. We explain how the attack worked and what this means for you.more »
Security Lessons (Almost) undetectable hardware-based rootkitsDec 01, 2008
We look at the history of the rootkit, including its newest incarnation, the DR RootKit.more »
Free antivirus toolkit ClamAV released a stopgap version 0.94.1 to fix a number of bugs, but also to provide a new feature.more »
Smart Access Intro Techniques for managing user identities in LinuxNov 01, 2008
Maybe password security isn't perfect, but most networks depend on it. This month we examine some tools for smarter, more versatile authentication.more »
Security Lessons How hacking got easyNov 01, 2008
When it comes to security, public disclosure of vulnerabilities and working exploit code is now common. We look at why this can be both harmful and helpful to securing your systems.more »
The Open Web Application Security Project (OWASP) has placed videos of its latest conference online. The open- source project concerns itself with web application security.more »
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.