SEAndroid SEAndroid brings better security to Android devicesMay 29, 2012
The still experimental but promising SEAndroid framework offers SELinux-like mandatory access control for the Android universe.more »
Security Lessons: Hacking Hardware Don’t forget your hardwareMay 29, 2012
Now that your networks are secure and you’ve convinced your users to secure their passwords and software, it’s time to turn your attention to your hardware to keep it from being attacked.more »
Secure your enterprise, monitor system performance, and more by harnessing the power of Splunk to search, monitor, report, and analyze events and data from any source.more »
For its size, fail2ban, a utility that scans logfiles and bans suspicious IP addresses, punches well above its weight.more »
You may have already tried PGP/GPG public key encryption for documents or mail, but do you know what’s going on under the hood and what level of security you’re actually getting? We take an in-depth look at GnuPG encryption.more »
Security Lessons: Cloud Security Tools for auditing and securing cloud systemsMar 29, 2012
Tools like OpenSCAP and Aqueduct can make life much easier when implementing cloud security standards.more »
Fluendo, Lineo Solutions, Mocana, and NVidia join the Linux Foundation and see the benefits of Linux in the future of computing.more »
Cloud Storage Behind the Firewall Bridging the Cloud and BYOD GapMar 09, 2012
ownCloud's new commercial venture lets you manage risk and data exposure in a bring-your-own-device age.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.