Security Projects - Page 24

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Security Projects News

Hacking Made Easy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

I am honoured to have been invited back to present at the prestigious e-Crime Congress to be held in London, March this year. However it caused a flash-back to the last occasion I presented at Congress in 2009, when things seemed to be very different.

Tech companies team up to combat e-mail scams

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Google, Facebook and other big tech companies are jointly designing a system for combating e-mail scams known as phishing. Such scams try to trick people into giving away passwords and other personal information by sending e-mails that look as if they come from a legitimate bank, retailer or other business.

Windows 8 Secure Boot - or How Microsoft Is Riling Up the Linux Masses

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"The trusting (ironic this is all about Trusted Computing) side of me wants to believe this is just a spec from Microsoft to ensure their OS runs correctly on hardware platforms," said Slashdot blogger yagu. "But history, track record, and all evidence to Microsoft's tactics since forever make me nervous... "I'm quite convinced (my opinion) Microsoft's motives remain the same as always."

Which Browser Is Most Secure? A New Study Reports A Surprise

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Ask some organizations why they bar users from using open source browsers at work, and the IT administrators running the show will say that they don't consider open source browsers to be secure. It's a common refrain. Lots of large organizations don't develop for Android or let employees use the platform for security reasons too.

Hacker gets Ice Cream Sandwich onto Kindle Fire

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A hacker named Steven has posted a video of Ice Cream Sandwich running on the Kindle Fire, along with more information in the XDA Developers forums. The hack is incomplete, lacking support for audio, Wi-Fi, the accelerometer and the light sensor. Also, transitions look a bit choppy, but it's a start.

Linux syslog may be on way out

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In an effort to foil crackers attempts to cover their tracks by altering text-based syslogs, as well as improve the syslog process as a whole, two Red Hat developers are proposing a new binary-based tool called The Journal that could replace the syslog daemon in as early as the Fedora 17 release.

Security trends for 2012

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In this article I have identified five influential security trends to watch in 2012. The results, identified by a team of highly experienced accredited security professionals and based upon extensive tests at client sites, suggest security threats are becoming more targeted and personal.

3 Steps To Make Your Database More Secure

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Sound IT risk management is all about identifying critical data assets and giving them the most protection. The more critical an asset, the more defenses should be around it. Unfortunately, when it comes to databases, most companies get that formula backward.