Security Projects - Page 25
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Google, Facebook and other big tech companies are jointly designing a system for combating e-mail scams known as phishing. Such scams try to trick people into giving away passwords and other personal information by sending e-mails that look as if they come from a legitimate bank, retailer or other business.
Recently, the website of Ankit Fadia, a well-known ethical hacker, was hacked by another group that goes by the name Team Grey Hat (TGH). The
Just over fourteen months since its first release as an Apache top-level project, the Apache Shiro developers have released version 1.2.0, the first major update to the Shiro application security framework.
"The trusting (ironic this is all about Trusted Computing) side of me wants to believe this is just a spec from Microsoft to ensure their OS runs correctly on hardware platforms," said Slashdot blogger yagu. "But history, track record, and all evidence to Microsoft's tactics since forever make me nervous... "I'm quite convinced (my opinion) Microsoft's motives remain the same as always."
If he has his way, Meinrath
Ask some organizations why they bar users from using open source browsers at work, and the IT administrators running the show will say that they don't consider open source browsers to be secure. It's a common refrain. Lots of large organizations don't develop for Android or let employees use the platform for security reasons too.
A hacker named Steven has posted a video of Ice Cream Sandwich running on the Kindle Fire, along with more information in the XDA Developers forums. The hack is incomplete, lacking support for audio, Wi-Fi, the accelerometer and the light sensor. Also, transitions look a bit choppy, but it's a start.
Security technology expert Bruce Schneier has been awarded an honorary degree from the University of Westminster. The Doctor of Science award from the university's School of Electronics and Computer Science was given in recognition for Schneier's 'hard work and contribution to industry and public life'.
In an effort to foil crackers attempts to cover their tracks by altering text-based syslogs, as well as improve the syslog process as a whole, two Red Hat developers are proposing a new binary-based tool called The Journal that could replace the syslog daemon in as early as the Fedora 17 release.
In this article I have identified five influential security trends to watch in 2012. The results, identified by a team of highly experienced accredited security professionals and based upon extensive tests at client sites, suggest security threats are becoming more targeted and personal.
IT and network administrators are increasingly concerned about data leaks and attacks from inside the company, but their user awareness training programs are falling short of the mark.
Sound IT risk management is all about identifying critical data assets and giving them the most protection. The more critical an asset, the more defenses should be around it. Unfortunately, when it comes to databases, most companies get that formula backward.
Here are some thoughts about providing users and businesses ways for a website to authenticate a user all the way to the hardware connection to his computer or mobile device.
Like skilled cat burglars, teams of college-age hackers slithered past defenses to probe the soft underbelly of a sophisticated computer system. Their mission: to steal secrets and leave an electronic calling card.
Two years after Rapid7 acquired the Metasploit Project, the company has rolled out a free and more user-friendly version of the open-source tool that is aimed at less technical users.
Virginia Tech researchers for the past month and a half have been working to customize Google
What's the most dangerous threat to your virtualized systems? Hint: it's not the latest zero-day exploit. The most pressing risk is IT staff who have full privileges in these systems.
Imperva researchers analyzed the activities of a large hacker forum for a year and found that members are discussing distributed denial of service attacks and providing tutorials.