Security Projects - Page 16
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
In this article, Threatpost catches up with David Baker, the chief security officer at Bugcrowd, about the future of bug bounty programs. While bug-bounty programs may seem like a cure-all solution for companies looking discover vulnerabilities in their systems more efficiently, the fact remains that a program could overwhelm a firm’s internal security team and cause other major headaches if implemented the wrong way.
Google is releasing robots.txt to the open-source community in the hopes that the system will, one day, becoming a stable internet standard.
June 29 marks the 25th anniversary of FreeDOS. That's a major milestone for any open source software project, and I'm proud of the work that we've done on it over the past quarter century. I'm also proud of how we built FreeDOS because it is a great example of how the open source software model works.
Two reports on cloud security were recently released: The 2019 Cloud Security Report and the Global Cloud Security Software Market report. The latter is a five-year forecast that covers 2019 through 2024. These reports showed where growth lies within the cloud security market and what challenges are presented to businesses who use or are looking to use cloud services.
The International Supercomputing Conference (ISC) kicked off in Frankfurt yesterday with the release of the latest list of the 500 most powerful supercomputers in the world. US machines still top the ranking, but China has the most computers on the list (219 versus 116 for the US).
As companies chase the transformational technologies that will deliver exponential returns, they should turn their attention from the “what” to the “how.” One type of software underpins many of the most exciting, cutting-edge innovations today, including AI, cloud, blockchain, and quantum computing: open source.
Have I Been Pwned has become a popular tool to find out whether or not you have been involved in a data breach, and after starting life as a one-man-band project, may soon be on the acquisition books.
Amidst an escalating trade war and political tensions with the US, Beijing officials have decided to develop a custom operating system that will replace the Windows OS on computers used by the Chinese military.
There are almost as many open source groups and projects working on edge computing as there are definitions of edge — one such project, in fact, focuses exclusively on defining edge terms. This is partially due to the hype, and consolidation will probably happen as the hype turns into real-life deployments and concrete use cases.
After nine months of alpha testing, a stable release of the Tor browser for Android can now be downloaded from Google’s Play store or direct from the Project’s website.
AI is becoming increasingly widespread, affecting all facets of society — even Sonic drive-ins are planning to implement artificial intelligence to provide better customer service.
Mozilla is looking for a more efficient way of integrating Tor into Firefox, and the organization is willing to throw money at the problem.
Developers at IBM are working on a new concept for the Linux kernel of "system call isolation" in order to isolate parts of the kernel when impacted by vulnerabilities.
Linux 5.1-rc6 is larger than the previous release candidate, but he isn't too worried right now about the condition of the upcoming Linux 5.1 kernel.
One of top 200 universities in the US, along with a helping hand from IBM, is getting its students into blockchain with dedicated training.
Google just announced a new security feature that allows users of Android 7 and later to use their smartphones to authenticate themselves to their Google accounts.
The European Commission has announced the launch of a pilot project intended to test draft ethical rules for developing and applying artificial intelligence technologies to ensure they can be implemented in practice.
When a security researcher finds a security bug, what do they do? Unfortunately, the answer sometimes is they search for the appropriate people to notify and, when they can’t be found, end up posting the vulnerability to public email lists, the GitHub project, or even Twitter.
Researchers have found a vulnerability in the open-source Facebook Fizz project which is relatively easy to trigger for the purposes of a denial-of-service (DoS) attack.
The internet's address book keeper has warned of an "ongoing and significant risk" to key parts of the domain name system infrastructure, following months of increased attacks.