Top White Papers
Which Linux distribution would you save?
Six open source security myths debunked - and eight real challenges to consider
Linux Today - Security
Researcher To Open-Source Tools For Finding Odd Authentication Behavior
(Jun 15, 2013, 23:00) (0 talkbacks)
Dark Reading: Rather than watching for communications between infected systems and command-and-control servers, companies can detect stealthy malware when it attempts to spread.
Can You Completely Secure Linux?
(Jun 14, 2013, 07:00) (2 talkbacks)
eSecurity Planet: How does Red Hat go about building and developing a secure Linux operating system?
IPv6 Under Attack?
(Jun 09, 2013, 06:00) (1 talkbacks)
eSecurityPlanet: Although IPv6 is still not widely adopted, the Internet is seeing the first signs of IPv6-based attacks.
Data Breach Cost Declines for 2nd Year
(Jun 07, 2013, 06:00) (0 talkbacks)
eSecurity Planet: Americans may be doing something right when it comes to data protection, finds a Ponemon Institute study - or are they just too overwhelmed to care?
Apple IOS Charger MACTANS Black Hat Hack Powered by Open Source?
(Jun 06, 2013, 04:00) (0 talkbacks)
InternetNews: From the 'Open Source BeagleBoard for Hackers' files:
Google's New Disclosure Policy: Helpful, or Who Cares?
(Jun 01, 2013, 19:00) (0 talkbacks)
eSecurityPlanet: One of the oldest debates in Information Security involves the right timing for responsibly disclosing a vulnerability.
What's Next for Mozilla Firefox Security?
(May 30, 2013, 04:00) (0 talkbacks)
Datamation: What's new and what's coming that will secure the open source browser
A closer look at a recent privilege escalation bug in Linux (CVE-2013-2094)
(May 23, 2013, 07:00) (0 talkbacks)
TimeToBleed: This article is going to explain how a recent privilege escalation exploit for the Linux kernel works.