The 2010 security report looks at more than 291 projects, with special focus on the Android 2.6.32 kernelmore »
Security Lessons Plugin VulnerabilitiesOct 27, 2010
Plugins provide a lot of functionality but, depending on their quality, they can provide unwanted security issues as well. We show you how to protect yourself from plugins.more »
Tech Tools International Technology NewsOct 25, 2010
- Netgear Launches Network Management Platform
- Low-Distortion TI Operational Amplifier
- Eurotech Unveils Catalyst TC
- IBM New Global Financing Program
Open Node unveils version 1.0 of their open source server virtualization solutionmore »
Astaro 8.100 focuses on Wireless functionality of Access Points and Wifi Controllersmore »
Security Lessons: Disposable Computers Avoiding cyberattackSep 29, 2010
One way to avoid having your personal information stolen is to use a disposable computer set up for sensitive operations.more »
Security Lessons: Linux WAP Wireless security and LinuxAug 31, 2010
If you are looking for a cheap and secure wireless router setup, check out Tomato, DD-WRT, or OpenWrt.more »
The secure communication solution gets an upgrade.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.