Security Projects - Page 15
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Are you a Mozilla Firefox user? Did you know that Firefox browser could soon receive a Tor mode add-on that would significantly enhance privacy by connecting to the Tor network? While the final goal is to implement a fully-featuredTORmode in the browser natively, such a project takes time, and members of Mozilla and the Tor team discussed the challenges at a recent meeting. Their proposal was to develop a browser add-on that would enable this Tor mode inFirefox, as this approach could give the two organizations enough time to plan on the engineering work that is needed for this new feature.
Have you been following the JEDI project? The $10 billion project has been full of controversy; however, the Pentagon still hopes to seal the deal with either Amazon or Microsoft next month.
Have you heard that security researchers have been working on security feature for Linux kernels that could protect Linux-based systems against attacks that affect Intel’s Hyper-Threading (HT) feature? Multiple side-channel threats the feature's vulnerable against, including L1TF/Foreshadow and the MDS attacks, have been revealed over the past few months.
In this article, Threatpost catches up with David Baker, the chief security officer at Bugcrowd, about the future of bug bounty programs. While bug-bounty programs may seem like a cure-all solution for companies looking discover vulnerabilities in their systems more efficiently, the fact remains that a program could overwhelm a firm’s internal security team and cause other major headaches if implemented the wrong way.
Google is releasing robots.txt to the open-source community in the hopes that the system will, one day, becoming a stable internet standard.
June 29 marks the 25th anniversary of FreeDOS. That's a major milestone for any open source software project, and I'm proud of the work that we've done on it over the past quarter century. I'm also proud of how we built FreeDOS because it is a great example of how the open source software model works.
Two reports on cloud security were recently released: The 2019 Cloud Security Report and the Global Cloud Security Software Market report. The latter is a five-year forecast that covers 2019 through 2024. These reports showed where growth lies within the cloud security market and what challenges are presented to businesses who use or are looking to use cloud services.
The International Supercomputing Conference (ISC) kicked off in Frankfurt yesterday with the release of the latest list of the 500 most powerful supercomputers in the world. US machines still top the ranking, but China has the most computers on the list (219 versus 116 for the US).
As companies chase the transformational technologies that will deliver exponential returns, they should turn their attention from the “what” to the “how.” One type of software underpins many of the most exciting, cutting-edge innovations today, including AI, cloud, blockchain, and quantum computing: open source.
Have I Been Pwned has become a popular tool to find out whether or not you have been involved in a data breach, and after starting life as a one-man-band project, may soon be on the acquisition books.
Amidst an escalating trade war and political tensions with the US, Beijing officials have decided to develop a custom operating system that will replace the Windows OS on computers used by the Chinese military.
There are almost as many open source groups and projects working on edge computing as there are definitions of edge — one such project, in fact, focuses exclusively on defining edge terms. This is partially due to the hype, and consolidation will probably happen as the hype turns into real-life deployments and concrete use cases.
After nine months of alpha testing, a stable release of the Tor browser for Android can now be downloaded from Google’s Play store or direct from the Project’s website.
AI is becoming increasingly widespread, affecting all facets of society — even Sonic drive-ins are planning to implement artificial intelligence to provide better customer service.
Mozilla is looking for a more efficient way of integrating Tor into Firefox, and the organization is willing to throw money at the problem.
Developers at IBM are working on a new concept for the Linux kernel of "system call isolation" in order to isolate parts of the kernel when impacted by vulnerabilities.
Linux 5.1-rc6 is larger than the previous release candidate, but he isn't too worried right now about the condition of the upcoming Linux 5.1 kernel.
One of top 200 universities in the US, along with a helping hand from IBM, is getting its students into blockchain with dedicated training.
Google just announced a new security feature that allows users of Android 7 and later to use their smartphones to authenticate themselves to their Google accounts.
The European Commission has announced the launch of a pilot project intended to test draft ethical rules for developing and applying artificial intelligence technologies to ensure they can be implemented in practice.