Applications

Why All Linux (Security) Bugs Aren’t Shallow

In 2014 the open source community faced more security challenges than it has at any other point in recent memory. The Heartbleed vulnerability in the OpenSSL project and She...

The Trouble with Tor

For over a decade, people all over the world have used Tor (formerly known as the Onion Router) to protect their privacy. The U.S. Naval Research Laboratory developed the system using open source te...

VeraCrypt a Worthy TrueCrypt Alternative

When the TrueCrypt encryption software project was abandoned two years ago, it left many folks looking for an open source encryption system. VeraCrypt appeared on the scene as a TrueCrypt alternativ...

An Open Source Solution to Shellshock

The Shellshock vulnerability in the Bash (Bourne Again Shell), first reported last week, has been fueling thousands of attacks against Web servers around the world ever sinc...

TrueCrypt Getting a New Life

When the developers of TrueCrypt delivered the bombshell that they were abandoning their popular open source encryption program, it left many organizations in a hugely diffi...

Are TrueCrypt Users Screwed?

The anonymous developers of the free and hugely popular TrueCrypt disk encryption program dropped a bombshell at the end of May when they abruptly abandoned the project.The ...

Can You Completely Secure Linux?

BOSTON: How does Red Hat go about building and developing a secure Linux operating system? That question was asked and answered at the Red Hat Summit this week by Josh Bress...

AlienVault Raises $34 Million for Open Source Based Unified Security Management

Is there money to be made on an open source unified security management platform? That's the bet being made by investors in security startup AlienVault.AlienVault announced ...

Sourcefire Pushes Open Source ClamAV Forward

It's been five years since IPS vendor Sourcefire acquired ClamAV's intellectual property and personnel resources. Since then, the open source antivirus project has prospered...

IBM Gets Behind Snort, Expands Anomaly Detection

Since its debut in 1998, the open-source Intrusion Prevention System (IPS) known as Snort has become a popular platform for security signatures to protect enterprise IT asse...

Latest articles