Security Projects - Page 28
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Major browser makers are beginning to revisit how they handle Web authentication after last month's breach that allowed a hacker to impersonate sites including Google.com, Yahoo.com, and Skype.com.
There are good and bad hackers. Here is a window into what they do and why: White Hat Hackers: These are the good guys, computer security experts who specialize in penetration testing and other methodologies to ensure that a company
Aaron Weaver works in the basement of his Pottstown home making the Internet a little safer. His skills as an information-security specialist are in such demand that his employer, Pearson Education, let him work from home after he told the education-publishing firm he wouldn't relocate to Colorado when it recruited him.
For many, security is like going to the dentist--you have to deal with it, but that doesn't mean you have to go willingly, or like it once you get there. One of the main problems with IT security, though, comes down to money. While new servers or PCs can be justified as an investment, security is seen simply as an expense and a headache. But, what if you could protect your network and your PCs without breaking the bank?
So, you bought a NookColor. It's a cool device, but if you've had one for a while and find that the novelty is slowly wearing off, you might be wondering what else Barnes & Noble's touchscreen e-reader can do. Wonder no more: Hackers have been hard at work, pushing the NookColor to its limits. Here are a few great things that the NookColor is capable of.
Leading a security program within an organization has taken on a new shape, says career expert Lee J. Kushner. What skills do security professionals need to hone now in order to be competitive in the job market?
Srivastava realized that the same logic could be applied to the lottery. The apparent randomness of the scratch ticket was just a facade, a mathematical lie. And this meant that the lottery system might actually be solvable, just like those mining samples.
The nonprofit Software Assurance Forum for Excellence in Code, a.k.a. SAFECode, today published a best practices guide for the software community based on techniques and processes used by its high-profile membership.
The first time Zach Mayo infiltrated a security program, he was barely in his teens. At home with his family's computer, he bristled at the parental control software cutting him off from the Internet after curfew.
Streaming set-top boxes are all the rage these days, especially with the rising popularity of subscription streaming services such as Hulu Plus and Netflix. Who doesn't want to watch Web-optimized video on their fancy new HDTV?
We've all heard of worms, Trojan horses, phishing, and other common computer security attacks that aims to infect your system and steal your data. But what about bluebugging, smishing, and scareware? Brush up on your computer security terminology with these lesser-known attackers.
We often bemoan the seeming immortality of username/password authentication schemes. Why can't everyone implement strong authentication, multifactor authentication, Secure Sockets Layer Virtual Private Networks (SSL VPN) for remote access?
After more than a year of development, the Insecure.org developers have released version 5.50 of Nmap, their popular open source network scanner and mapper. According to the developers, the primary focus of this second stable update since Nmap 5.00 is the Nmap Scripting Engine (NSE); this "has allowed Nmap to expand up the protocol stack and take network discovery to the next level".
Data security is always top of mind for CIOs and CSOs, and there is no shortage of challenges when it comes to picking the right tool for the job. With network and software vulnerabilities growing at a perpetual rate, good security software can help defend against many of the large-scale threats that occur locally and from all over the Internet.
The Merit Network will hold an Class on SELinux Security, Jan. 19 & 26; this short course focuses on preventing malicious attack. Taught during two three-hour sessions, it is provided through Merit's Professional Learning program and will be held on January 19 and 26, 2011, beginning at 6:00 p.m. EST each day.
A security researcher by the name of Ralf-Phillip Weinmann says he has discovered a baseband hack that allows for malicious code to be sent to mobile devices. According to the report, it takes advantage of bugs found within the firmware of cellphone chipsets sold my manufacturers such as Qualcomm and Infineon Technologies.
Google patched 16 vulnerabilities in Chrome on Thursday, paying one researcher a record $3,133 for reporting a single bug. The flaws fixed in Chrome 8.0.552.334 were in several components, including the browser's support for extensions, its built-in PDF viewer, and CSS (cascade style sheet) processing.
"It's not a social city," said Vegas resident Evan Pipho, a programmer who, with Jeff Rosowski, is trying to find a way to bring the city's hackers, makers and coders together. Thanks to the pair, Las Vegas has its own Dorkbot chapter and they are in the process of setting up a hackerspace in Mr Rosowski's garage.