Security Projects - Page 27

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Security Projects News

7 Types of Hacker Motivations

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There are good and bad hackers. Here is a window into what they do and why: White Hat Hackers: These are the good guys, computer security experts who specialize in penetration testing and other methodologies to ensure that a company

Data security in demand, pays well

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Aaron Weaver works in the basement of his Pottstown home making the Internet a little safer. His skills as an information-security specialist are in such demand that his employer, Pearson Education, let him work from home after he told the education-publishing firm he wouldn't relocate to Colorado when it recruited him.

Security on a Shoestring Budget

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For many, security is like going to the dentist--you have to deal with it, but that doesn't mean you have to go willingly, or like it once you get there. One of the main problems with IT security, though, comes down to money. While new servers or PCs can be justified as an investment, security is seen simply as an expense and a headache. But, what if you could protect your network and your PCs without breaking the bank?

10 Cool Hacks For Your NookColor

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

So, you bought a NookColor. It's a cool device, but if you've had one for a while and find that the novelty is slowly wearing off, you might be wondering what else Barnes & Noble's touchscreen e-reader can do. Wonder no more: Hackers have been hard at work, pushing the NookColor to its limits. Here are a few great things that the NookColor is capable of.

4 skills CISOs need now

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Leading a security program within an organization has taken on a new shape, says career expert Lee J. Kushner. What skills do security professionals need to hone now in order to be competitive in the job market?

Cracking the Scratch Lottery Code

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Srivastava realized that the same logic could be applied to the lottery. The apparent randomness of the scratch ticket was just a facade, a mathematical lie. And this meant that the lottery system might actually be solvable, just like those mining samples.

They're the good-guy hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The first time Zach Mayo infiltrated a security program, he was barely in his teens. At home with his family's computer, he bristled at the parental control software cutting him off from the Internet after curfew.

Hack Your Streaming Set-Top Box

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Streaming set-top boxes are all the rage these days, especially with the rising popularity of subscription streaming services such as Hulu Plus and Netflix. Who doesn't want to watch Web-optimized video on their fancy new HDTV?

The Computer Attacks You've Never Heard Of

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

We've all heard of worms, Trojan horses, phishing, and other common computer security attacks that aims to infect your system and steal your data. But what about bluebugging, smishing, and scareware? Brush up on your computer security terminology with these lesser-known attackers.

Version 5.50 of the Nmap network scanner released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

After more than a year of development, the Insecure.org developers have released version 5.50 of Nmap, their popular open source network scanner and mapper. According to the developers, the primary focus of this second stable update since Nmap 5.00 is the Nmap Scripting Engine (NSE); this "has allowed Nmap to expand up the protocol stack and take network discovery to the next level".

5 open source security projects to watch

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Data security is always top of mind for CIOs and CSOs, and there is no shortage of challenges when it comes to picking the right tool for the job. With network and software vulnerabilities growing at a perpetual rate, good security software can help defend against many of the large-scale threats that occur locally and from all over the Internet.

Online Class on SELinux Security, Jan. 19 & 26

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Merit Network will hold an Class on SELinux Security, Jan. 19 & 26; this short course focuses on preventing malicious attack. Taught during two three-hour sessions, it is provided through Merit's Professional Learning program and will be held on January 19 and 26, 2011, beginning at 6:00 p.m. EST each day.