Counterfeit links are able to deceive the Firefox and Chrome browsers, directing users to unintended websites.more »
The Shoreline Firewall product, also known as Shorewall, has arrived in its 4.2.4 version. The new release includes a configuration tool for IPv6 networks.more »
Bit9, self-professed leader in enterprise application whitelisting, recently included Mozilla's Firefox browser among "the Dirty Dozen" applications with critical security vulnerabilities. Mozilla's security expert Jonathan Nightingale disputes that critique.more »
Codenamed "Coltrane", the major release of Wordpress 2.7 comes with more than a few changes.more »
The Browser Security Handbook (BSH) from search engine company Google has been published under free license.more »
Smart Access Intro Techniques for managing user identities in LinuxOct 31, 2008
Maybe password security isn't perfect, but most networks depend on it. This month we examine some tools for smarter, more versatile authentication.more »
Security Lessons How hacking got easyOct 31, 2008
When it comes to security, public disclosure of vulnerabilities and working exploit code is now common. We look at why this can be both harmful and helpful to securing your systems.more »
Web Authentication Adding authentication to your websiteOct 31, 2008
Apache offers several options for adding a password-protected area to a website.more »
But if you are not using the latest Linux kernel, your system is insecure.
Home routers will give room for custom firmware but still comply with FCC rules
Frank Karlitschek will continue to lead the open source ownCloud project
“Xenial Xerus” comes with a new packages format and several improvements for the enterprise.
Linux users can now download and install the Windows code editor
New initiative will address security and interoperability concerns around container technology.
Developers can use RHEL as a development platform without a subscription fee.
Windows users will soon have native access to the Bash shell.
Improvements to SMTP will provide better guarantee of confidentiality
Graphics vendor embraces new reality in Linux graphics