Full release of BackTrack Linux 5 R2 is now available.more »
Charly’s Column: w3af The sys admin’s daily grind: w3afMar 02, 2012
After toiling away to create a small but exclusive website, Charly wanted to run a security scanner against it to check for vulnerabilities. The choice of tools is enormous, but Charly chose w3af.more »
Security Lessons: Fixing SSL How to fix SSLMar 02, 2012
We look at some new approaches to certificate verification.more »
Security Lessons: Self-Defense Separating the wheat from the chaffFeb 02, 2012
Attackers impose a high price on your limited resources. We look at some ways to separate the good from the bad.more »
Security Lessons: Interoperability Interoperability and code reuseJan 03, 2012
Developing cross-platform apps can be difficult and error prone. We offer some tips to ease the work.more »
Security Lessons: Rescue Tools Rescuing data from attackersNov 30, 2011
When attackers strike your system, you need to determine exactly what damage has been done. Here are some tools to help.more »
Security Lessons: Password Storage Storing your passwords properlySep 23, 2011
High-performance graphics cards and proper storage can help keep your passwords secure.more »
November 2011: DVD Inlay Issue #132Sep 23, 2011
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.