Security Projects - Page 20
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Lockpicking has become a trademark skill of hackers all across the world, and is regularly taught at hackerspaces and maker faires. But a lot of the time, the sets have already been made or bought online somewhere. However, [Sean] has demonstrated how to create a lock picking set with ordinary paperclips in the video embedded at the end of this post.
A nippy microkernel mathematically proven to be bug free*, and used to protect drones from hacking, will be released as open source tomorrow.
Another month, another few dozen patches to install -- it's never-ending. It's frustrating. Software coding tools supposedly have security built in by default. We have "safe" programming languages. We have programmers using SDL (security development lifecycle) coding tools and techniques.
What started out as a hobby collecting fun ideas to customise IKEA products became so big that the Swedish furniture giant threatened a lawsuit against Ipoh-born Jules Yap over trademark violation.
Paraphrasing the song made famous in the 1960s by The Troggs and wonderfully updated by Bill Nighy in "Love Actually" Big Data is really all around us. We are making more and more data about ourselves available to a broader audience. But what if that data is stolen? Is it useful to anyone?
A British computer hacker arrested in 2011 for breaching the website of internet news company Gawker was apprehended with the help of a former acquaintance from outside Albany, New York, according to just leaked, previously unpublished court files.
Reeling from the Heartbleed security fiasco, major IT vendors including Microsoft, IBM, Intel, Google and Cisco are backing a Linux Foundation initiative designed to boost open source projects considered critical to the industry.
If we've learned one lesson from the Heartbleed fisaco, it's this: It should never happen again. But just patching or upgrading a project as crucial as OpenSSL won't be enough in the long run. When the Internet's stability and security rest on a project, that project must be given solid material support that ensures both growth and dependibility.
Forget bad headlines generated by the Heartbleed flaw, when it comes to code defects open source is still well ahead of proprietary software, generating fewer coding defects for every size of project, according to a new analysis by scanning service Coverity.
Thank the hackers. This week's Heartbleed vulnerability has everyone running scared (see box below to read what you might do to protect yourself). The serious crack in the foundations of the supposedly secure internet was revealed earlier this week by a software engineer probing website security in his spare time.
Automated testing has its place in detecting IT security weaknesses but it cannot replace manual testing. The most effective means to protect data is a combination of manual testing and automated scans.
When it comes to forensics, penetration and security testing Kali Linux
Coders, designers, programmers and dreamers of all ages stayed indoors over the rainy weekend to participate in a 30-hour development marathon aimed at kick-starting creative technology and product ideas that can bring Sacramento a little closer to Silicon Valley.
We are launching a new series of interviews with Kaspersky Lab experts enquiring their opinion regarding cyber-security industry and related threats. Here, Dr. Stefano Ortolani tells us about the importance of programming and other special skills needed to become an expert in the cyber security industry.
IT security pros with the right skills are in big demand. Last year, the employment rate for information security managers averaged .9%, as we reported in High CISO employment rates means shortage for security industry. That's as close to actual full employment as one can get.
Back when we were kids, "security" meant little more than having a secret password to keep little siblings out of the treehouse. That's still the case in some situations. Take the title of this column, for instance. If you go to the #linuxjournal IRC channel on FreeNode, saying "Lapsang Souchong" will mark you as part of the inner circle. (Note, this does not make you one of the cool kids...possibly the exact opposite!)
We most often hear of the security breaches due to cross site scripting and SQL injection attacks, after the related vulnerabilities have been successfully exploited. But what could we do to prevent such attacks occurring in the first place?
Today in Open Source: Does Linux Mint have a security problem? Or has the media made a mountain out of a molehill?
Richard Stallman believes the U.S. patent system damages the software industry. Free Software Foundation president Richard Stallman tried to get Stratfor hacker Jeremy Hammond