open source
NTRU public key crypto released to open source community
RSA and ECC are the two most common public-key crypto systems in use today. At the 2013 Black Hat conference, researchers declared that the math for cracking encryption …
Google encourages teens to contribute to open source projects
For the fourth year in a row, Google has organized its Code-in contest for pre-university students to contribute to open source projects. “For many students the Google …
Lavabit and Silent Circle to create email impervious to snooping
The founders of recently shut down encrypted email service Lavabit and encrypted communications firm Silent Circle have announced the creation of the Dark Mail Alliance, a …
Centralizing threat intelligence to feed network defense systems
ThreatConnect announced the launch of a prototype that connects commercial security products with advanced threat intelligence through an open source standard known as the …
Nmap cheat sheet
Network Mapper – better known by its shortened name Nmap – is one of the most long-lived security tools out there. Used for scanning computer networks for ports, …
Ubuntu 13.10 released, improves on cloud setup and management
Canonical released the next version of Ubuntu for server and cloud environments. Ubuntu 13.10 delivers the latest and best version of OpenStack, and is the fastest, most …
Google offers rewards for code improvements to open source programs
Google has announced that they plan to reward researchers who aim to “improve the security of key third-party software critical to the health of the entire …
GnuPG 2.0.22 fixes security problem
GnuPG 2.0.22 is a security fix release and all users are advised to updated to this version. What’s new: Fixed possible infinite recursion in the compressed packet …
Securing the modern web: Open sourcing the future of IAM
Every CIO needs a reliable identity and access management (IAM) system for protecting employee, customer, and partner data – and for years, they have relied on …
Logging and Log Management
Every security practitioner should by now be aware of the overwhelming advantages of logging and perusing logs for discovering intrusions into systems. But logging and log …
The New Yorker launches anonymous dead-drop tool
Popular U.S. magazine The New Yorker has made available for its potential sources an anonymous dead-drop tool that allows them to send and receive messages and files to the …
Open source NAC PacketFence 4.0 released
PacketFence is a fully supported, trusted, free and open source NAC solution. Among the features provided by PacketFence, there are: BYOD workflows Guests management Multiple …
Featured news
Resources
Don't miss
- April 2025 Patch Tuesday forecast: More AI security introduced by Microsoft
- Forward-thinking CISOs are shining a light on shadow IT
- Inside the AI-driven threat landscape
- Ivanti VPN customers targeted via unrecognized RCE vulnerability (CVE-2025-22457)
- Attackers are leveraging Cisco Smart Licensing Utility static admin credentials (CVE-2024-20439)