Security Projects - Page 21
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
With the increasing number of breaches in security with respect to credit card, mobile etc it is becoming imperative that we do all that we can to safeguard our property. So is the case with software developers.
The pre-installed crapware that fills many Android phones is more than just annoying -- it also frequently opens up big security holes. Here's how to kill the crapware and keep your phone safe and in tip-top shape.
The latest version of Google's Android operating system (version 4.4) -- known as "KitKat" and released last week -- includes a slew of changes: a streamlined footprint so it can run on devices with scant RAM, better animations and graphics acceleration, plus snappier device-wide search and a new phone dialer app. But what's new on the information security front?
The Department of Defense thought the Russians were attacking. An MIT computer called PREP was the first to be penetrated. It was Nov. 2, 1988, and the time was approximately 8 p.m. Within hours and into the following morning, an estimated 10% of all machines connected to the Internet would crash, overloaded with several copies of a mysterious program.
Open source software can be one answer to combating the global surveillance of innocent citizens, said security expert Mikko Hypponen in his keynote last week at LinuxCon and CloudOpen Europe in Edinburgh.
Data security is something that most people don't want to think about. In our age of persistent connectivity, most data users, whether they are on a desktop, laptop or cell phone, connect to their data without thinking of the security risks of transmitting their data by connecting to a public network or an unsecured network of any kind.
Google said Wednesday it plans to reward developers for developing proactive security improvements for some of the most widely used open-source software programs.
According to the 2013 Chief Information Security Officers survey by the Open Web Application Security Project (OWASP), 75 percent of CISOs responded that external attacks had increased. When asked what the main areas of risk as percentage of the overall risk are, 70 percent of CISOs responded that web applications represent an area of risk higher than network infrastructure. - See more at:
Last week I noted that the GNU project was celebrating its 30th anniversary. I thought it might be interesting to hear what Richard Stallman had to say about the environment in which he came up with the idea for GNU. What follows is part of a long interview I conducted with him in 1999, when I was carrying out research for "Rebel Code".
More than two in three IT professionals would consider ex-hackers for security roles, providing they have the right skills to do the job, a survey has found.
Emmanuel Goldstein from 2600 Magazine sez, "A few weeks ago, 2600 made its entire archive of radio shows available for free on the web in high fidelity. The response to this has been so great that the bandwidth charges have now gone through the roof.
The end is nigh, and the date of doom has been foretold. The Windows XPocalypse is set to unleash hell on April 8, 2014, and in a bid to preserve the security of its citizens, the German city of Munich is turning to an unlikely savior: Ubuntu Linux.
The USENIX Security conference has been warned that by tweaking the firmware on certain kinds of phones, a hacker could make it so other phones in the area are unable to receive incoming calls or SMS messages.
On a recent day at work in a San Francisco loft, Moncef Belyamani was sporting a hipster "LOVE" T-shirt and riffing, with obsessive detail, on the evolution of vinyl record production.
Evgeny Morozov makes a point about surveillance and big data: it just looks for useful correlations without worrying about causes, and leads people to implement "fixes" based simply on those correlations -- rather than understanding and correcting the underlying the causes.
Internet security is almost an oxymoron, as a computer connected to the Internet is the least secure of machines. However, many organizations have found ways to protect the internal network from Internet attacks as well as ensure that employees are not violating the Internet use policy.
While the world parses the ramifications of the National Security Agency
Mozilla, maker of the popular Firefox web browser, and dozens of political, technology and business groups launched a campaign Tuesday calling for action against federal agencies snooping on citizens on the Internet.