Users only had 7 hours to update before the intrusions started.more »
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.more »
Vulnerability affects many Linux web serversmore »
What’s New in Samba 4 Samba 4May 06, 2013
In December 2012, the open source world received the first, and very long awaited, release of the Samba 4.x series.more »
Firefox Extensions Getting More from FirefoxFeb 24, 2013
Firefox features many high-quality extensions to help improve productivity, protect your privacy, and more.more »
FTC hopes to build trust between app providers and mobile users through more transparent data practices.more »
PHP Security Principles Seven principles for preventing vulnerabilities in PHP programmingOct 26, 2012
Many web attacks are the result of programmer error. Sloppy code testing leaves a door open for the uninvited.more »
Testing Password Quality Creating secure passwords and testing their qualityOct 09, 2012
Create secure passwords with the help of a password generator and check for quality at the same time.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.