Security Projects - Page 15

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Security Projects News

Mozilla Firefox Could Soon Get a “Tor Mode” Add-on

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Are you a Mozilla Firefox user? Did you know that Firefox browser could soon receive a Tor mode add-on that would significantly enhance privacy by connecting to the Tor network? While the final goal is to implement a fully-featuredTORmode in the browser natively, such a project takes time, and members of Mozilla and the Tor team discussed the challenges at a recent meeting. Their proposal was to develop a browser add-on that would enable this Tor mode inFirefox, as this approach could give the two organizations enough time to plan on the engineering work that is needed for this new feature.

Linux May Gain Protection Against Hyper-Threading Attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Have you heard that security researchers have been working on security feature for Linux kernels that could protect Linux-based systems against attacks that affect Intel’s Hyper-Threading (HT) feature? Multiple side-channel threats the feature's vulnerable against, including L1TF/Foreshadow and the MDS attacks, have been revealed over the past few months.

Implementing Bug Bounty Programs: The Right and Wrong Approaches

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In this article, Threatpost catches up with David Baker, the chief security officer at Bugcrowd, about the future of bug bounty programs. While bug-bounty programs may seem like a cure-all solution for companies looking discover vulnerabilities in their systems more efficiently, the fact remains that a program could overwhelm a firm’s internal security team and cause other major headaches if implemented the wrong way.

FreeDOS turns 25 years old: An origin story

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

June 29 marks the 25th anniversary of FreeDOS. That's a major milestone for any open source software project, and I'm proud of the work that we've done on it over the past quarter century. I'm also proud of how we built FreeDOS because it is a great example of how the open source software model works.

Edge Magnifies Open Source Challenges, Opportunities

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There are almost as many open source groups and projects working on edge computing as there are definitions of edge — one such project, in fact, focuses exclusively on defining edge terms. This is partially due to the hype, and consolidation will probably happen as the hype turns into real-life deployments and concrete use cases.