Cyber risk is increasing for individuals and organizations, making flexible and robust solutions for identifying spam and malware increasingly critical. Apache SpamAssassin is an anti-spam framework we stand behind and have been using in Guardian Dig...
I do not often do this, but old friend is in trouble. Please stay with me as I tell this story.
It was around the year 2002, and I was in Brazil. I met two young college students who were very interested in Linux, and who impressed me with their enthusiasm and willingness to help others.
A presentation on a low-budget method to unmask users of a popular online privacy tool, TOR, will no longer go ahead at the Black Hat security conference early next month.
How secure is your wireless router? The Def Con 22 hacker conference aims to find out exactly how resilient off the shelf products are next month during a six-day hackathon.
Most organizations are very bad at computer security.
They don't patch well, and they have short, simple passwords that don't expire. They have dozens to hundreds of people in elevated groups. They don't have a clue who has which permissions in their environment.
At Google's Pwnium hacking competition, two new security exploits in Chrome OS were demonstrated, while at Pwn2Own a Chrome Web browser problem was found that also impacted Chrome OS. All three problems have now been patched.
Researchers on Wednesday cracked Microsoft's Internet Explorer 11 (IE11), Mozilla's Firefox and Adobe's Flash and Reader at the Pwn2Own hacking contest, earning $400,000 in prizes, a one-day record for the challenge.
A relatively small but influential list of speakers for the upcoming RSA Conference have decided to withdraw from the show in the wake of stories implicating RSA as a co-conspirator in the NSA
Hundreds of protests around the world sparked up on Tuesday in what the hacking collective Anonymous called the "Million Mask March." Donning Guy Fawkes masks, the demonstrators' goal was to "defend humanity."
It is perhaps a little hard to remember now, but in 2010, there seemed to be a new global superpower. A superpower that acted in unorthodox ways, which was unaccountable and yet of the people, and that was above all nameless, faceless and, as it styled itself, Anonymous.
It used to be that the playful Defcon contest of "Spot the Fed" gave hackers and the government agents tracking them a chance interact in a less serious manner.
This week we have the DefCon 20 and Black Hat computer security conferences in Las Vegas -- reasons enough for me to do 2-3 columns about computer security. These columns will be heading in a direction I don
Some of the world's most skilled social engineers and hackers head to Las Vegas next week for Black Hat and Def Con. Heed these nine tips and avoid becoming a victim yourself while at the events
Since its founding in 1992, Defcon has been a venue where anarchists, geeks, and employees of three-letter federal agencies became unlikely comrades under a live-and-let-live credo that placed the love of computer tinkering above almost everything else.
Sophisticated hackers now use "social engineering" - exploiting the psychological vulnerabilities of human users - rather than technological weaknesses in security systems, famous former hacker Kevin Mitnick told a cyber security conference in Dubai.
The University of NSW is known for producing some of Australia's top lawyers, doctors and accountants. But the 64-year-old institution is now gaining a reputation for excelling in what is often viewed as anti-establishment
The HackMiami 2013 Hackers Conference, taking place on Miami Beach, will feature comprehensive training seminars that seek to facilitate the skills of SQL injection, smartphone attacks, and enterprise network breaches.